f4 Learning Area 1 Ict (3)

download f4 Learning Area 1 Ict (3)

of 27

description

TYU

Transcript of f4 Learning Area 1 Ict (3)

28

Soalan-Soalan Berdasarkan Subtopik ( Soalan Percubaan ICT SPM Negeri-negeri 2013 dan Soalan SPM Sebenar 2008-2013)

SMK RAJA MUDA MUSA

BESTARI JAYA SELANGOR

(INTRODUCTION OF ICT)NAMA

:

TINGKATAN: 4..

1.1 Introduction to Information Technology 1.1.1 Overview of Information and Communication Technology (ICT)

1.1.1.1 Define ICT.

1.1.1.2 Describe the brief evolution of computers.

SECTION A

1. State the name of the first generation computer.

Nyatakan nama komputer generasi pertama

(SPM 2008)

2. Figure 1 shows three technologies used in the generations of computers Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

(SPM 2010)Based on Figure 1, write A, B or C to match the following:

Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut: (i) Second Generation /

Generasi Kedua

...................

(ii) Third Generation /

Generasi Ketiga

.

Figure 1 / Rajah 1

3.. Complete the following statement: / Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers,( i) ...........................devices and( ii) ......;:......................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.

Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.

(SPM 2010)4. The following are features for one generation of computer.

Berikut merupakan ciri-ciri satu generasi komputer.

(Kedah 2013) Vacuum tube technology / Teknologi vakum tiub

Huge size / Bersaiz besar

.

State the generation of the computer.

Nyatakan generasi komputer tersebut

..

5. Figure 1 show the technologies used in two different generations of computers.

Rajah 1 menunjukkan teknologi yang digunakan dalam dua generasi komputer yang berbeza.

(Kelantan 2013 Set 1)

(A)

(B)

Figure 1 / Rajah 1

Which of the following is true? / Antara berikut, yang manakah benar?(A)(B)

AFirst Generation

Generasi PertamaFourth Generation

Generasi Keempat

BSecond Generation

Generasi KeduaFirst Generation

Generasi Pertama

CThird Generation

Generasi KetigaSecond Generation

Generasi Kedua

DThird Generation

Generasi KetigaFourth Generation

Generasi Keempat

6. Figure 1 shows the technologies used in the evolution of computers :

Rajah 1 menunjukkan teknologi yang digunakan dalam evolusi komputer.(Pahang 2013)

Figure 1 / Rajah 1 Based on Figure 1 state the name of component.

Berdasarkan Rajah 1, nyatakan nama komponen.

(i) X.(ii) Y.7. Which technology was used to replace vacuum tubes?

Teknologi manakah yang digunakan untuk menggantikan tiub hampagas?(Terengganu 2013)A Transistors/Transistor

B Microprocessor/Pemproses mikro

C Integrated circuit/Litar bersepadu

D Artificial intelligence/Kepintaran buatan1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce

1.1.2.1 List the usage of ICT in everyday life.

SECTION A

1. Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of ICT usage in _______________ sector.

(Kelantan 2013 set 3)ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICT dalam bidang _______________.

2.ICT has bring many positive impacts on society.

ICT membawa banyak kesan positif terhadap masyarakat. (Kelantan 2013 set 5)

Figure 1 / Rajah 1

Based on Figure 1, state positive impacts of ICT on society

Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakatI. Lower communication cost because people can save time and resources

Kos komunikasi yang rendah kerana manusia boleh menjmatkan masa dan sumber

II. Inappropriate online communication with unknown person through the Internet

Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet

III.

Effective sharing of information and opinions

Perkongsian maklumat dan pendapat yang efektif

IV. Effective sharing slander and false contents

Perkongsian fitnah dan penipuan kandungan yang efektif

A. I and II

B. I and III

C. II and IV

D. III and IV1.1.2.2 State the differences between computerised and non-computerised systems.SECTION B

1. Figure 6 shows a situation in a banking system. /

Rajah 6 menunjukkan situasi di dalam sistem bank.

(Kedah 2012)

Figure 6 / Rajah 6

Based on Figure 6:/Berdasarkan Rajah 6:

State the difference between system A and system B.

Nyatakan perbezaan di antara sistem A dan sistem B.

[2 marks][2 markah]

1.1.2.3 State the impact of ICT on society.

SECTION A

1. Statement 1 is regarding to the use of ICT in everyday life.

(PERAK 2011)

Statement 1 / Penyataan 1

Statement 1 refer to the use of ICT in ... sector.

Penyataan 1 merujuk kepada penggunaan ICT dalam sector

2. Write the correct words to complete the following statement: ( KEDAH 2011)

Tulis perkataan yang betul untuk melengkapkan pernyataan berikut:

Information and Communication Technology enables information to be stored and retrieved through digital medium instead of printed materials. This creates a/an (i) ............................... environment. Communication technology that uses the Internet provides (ii) ................................ communication since it is not restricted by geographical and political boundaries.

Teknologi Maklumat dan Komunikasi membolehkan maklumat disimpan dan dicapai melalui media digital dan bukan bahan bercetak. Perkara ini mewujudkan persekitaran (i) .............................. . Teknologi komunikasi yang menggunakan Internet menyediakan komunikasi (ii) ................................... boleh dilakukan tanpa batasan geografi dan politik.3. Which of these is an impact of slander towards society?

Yang manakah kesan kepada fitnah terhadap masyarakat?

(P.Pinang 2012)

A Closer relationship / Hubungan lebih rapatB Trust among people / Kepercayaan di antara manusiaC Higher moral behaviour / Perlakuan moral lebih tinggi.D Bad reputation of people / Reputasi buruk pada seseorang.4. ICT has brought many positive impacts on society.

ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)

Figure 1/ Rajah 1

Based on Figure 1, state one positive impact of ICT on society

Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat

I. Lower communication cost because people can save time and resources

Kos komunikasi yang rendah kerana manusia boleh menjimatkan masa dan sumber

II. Inappropriate online communication with unknown person through the Internet

Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui InternetIII. Effective sharing of information and opinions

Perkongsian maklumat dan pendapat yang efektif

IV. Effective sharing slander and false content

Perkongsian fitnah dan penipuan kandungan yang efektifA. I and II B. I and IIIC. II and IVD.III and IV

SECTION B

1. Based on figure 1, state a difference between the education before ICT and education with ICT .

Merujuk kepada rajah 1, nyatakan perbezaan antara pendidikan tanpa ICT dan pendidikan berbantukan ICT.

(PERAK 2011)

EDUCATION BEFORE ICT /

PEMBELAJARAN SEBELUM MENGGUNAKAN ICTEDUCATION WITH ICT /

PEMBELAJARAN MENGGUNAKAN ICT

[2 markah]

b.List TWO sectors that uses ICT in daily life.

Senaraikan dua sektor yang menggunakan ICT di dalam kehidupan seharian.

1

2.

[2 markah]

1.2 Computer Ethics and Legal Issues

1.2.1 Definition

1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.SECTION A

1. Table 1 shows the characteristics of X and Y in computer usage guideline.

Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan komputer.

(SPM 2011)

XY

Moral guidelines for computer users.

Garis panduan moral untuk pengguna komputer.Rules for computer users.

Peraturan-peraturan untuk pengguna komputer.

No penalty or punishment.

Tiada penalti atau hukuman.Penalties or punishments imposed.

Penalti atau htLkuman dikenakan.

Table 1 / Jadual 1l

Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:

(i) X(ii) Y2. Table 1 below shows computer ethics. Based on table, select A, B, C or D for the following statements

Jadual 1 di bawah menunjukkan etika komputer. Berdasarkan jadual, pilih A, B, C atau D untuk pernyataan-pernyataan berikut.

(Kelantan 2013 set 3)Computer EthicsComputer CrimeCode of EthicsCode of Crime

ABCD

Table 1 / Jadual 1

a. Is a system of moral standard or moral values used as a guideline for computer user

Adalah sistem standard moral atau nilai moral digunakan sebagai panduan untuk pengguna computer.

.b. Is guidelines in ICT that help determine whether a specific computer action ethical or unethical.

Satu panduan dalam ICT yang membantu bagi menentukan sesuatu computer action beretika atau tidak.SECTION B1. Figure 6 shows an application in a smartphone.

Rajah 6 menunjukkan satu aplikasi dalam telefon pintar.

(Terengganu 2013)

Figure 6 / Rajah 6

Based on Figure 6, / Berdasarkan Rajah 6,

Give two impacts of using this application to society.

Justify your answer.

Berikan dua kesan penggunaan aplikasi ini terhadap masyarakat.

Justifikasikan jawapan anda.

[4 markah][4 marks]

...................................................................................................................................

............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

1.2.1.2 Differentiate between ethics and law.

SECTION A

1. State whether the following statements is True or False.

Nyatakan sama ada pernyataan berikut Benar atau Palsu. (Kelantan 2013 Set 1)Both ethics and law are made as a rule to control computer users.

Etika dan undang-undang diwujudkan sebagai peraturan untuk mengawal pengguna komputer.

2.

State whether the following statement is True or False.

Nyatakan sama ada peryataan berikut Benar atau Palsu. (Kelantan 2013 Set 5)We need computer ethics and laws to prevent users from misusing the computer. Computer

laws are universal, can be applied anywhere, all over the world.

Kita memerlukan etika dan undang-undang komputer untuk menghalang pengguna dari

menyalahgunakan komputer. Undang-undang komputer bersifat sejagat, boleh digunakan dimana-mana negara di dunia.

SECTION B1. Statement 2 is about computer ethics.

Pernyataan 2 tentang etika computer.

(AMPANGAN SEREMBAN 2013)

Statement 2/ Pernyataan 2

Based on Statement 2,

Berdasarkan Pernyataan 2,(a) What is the type of misconduct based on the underlined phase above?

Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di atas?

[2 marks][2 markah]

.

..(b) Explain the negative impact done by Ali towards the school.

Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.

[2 marks][2 markah]

.

..1.2.1.3 State the need for intellectual property laws.

1.2.2 Privacy

1.2.2.1 List ways to protect privacy.

SECTION A

1. State whether the following statements is True or False.

Nyatakan sama ada pernyataan berikut Benar atau Palsu.

(Kelantan 2013 Set 1)Privacy means that we have the right not to disclose our personal details.

Kebersendirian bermaksud kita mempunyai hak untuk tidak mendedahkan maklumatperibadi.2. The right of individuals and companies to deny or restrict the collection and use of data and information about them refers to _________________.

Hak individu dan syarikat-syarikat untuk menafikan atau menyekat pengumpulan dan penggunaan data dan maklumat tentang mereka merujuk kepada _________________ .

Terengganu 2013..............................SECTION B

1.

The following is a statement on information privacy.

Pernyataan berikut berkaitan keperibadian maklumat (SPM 2007)

Based on the statement, list four ways of making personal data more private.

Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi

lebih peribadi

i) .

ii) .

iii) .

iv) ..1.2.2.2 State authentication and verification methods/technologies.

SECTION A

1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.(SPM 2009 )

Based on Figure l, / Berdasarkan Rajah 1,

(i) State the name of the device. / Nyatakan nama peranti itu.

(ii) State the function of the device / Nyatakan fungsi peranti itu.

2. Figure 1 shows information on two types of authentuication methods.Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan (SPM 2012)Based on figure 1 , state the name of / berdasarkan rajah 1, namakani. P..

ii. Q .3. Which of the following is the example of verification method?

Antara berikut yang manakah merupakan contoh kaedah pengesahan?

(Kelantan 2013 Set )

A. Callback system B. Iris scanning

Sistem panggilan Imbasan iris

C. Identification card

D. Voice recognition

Kad pengenalan Pengecam suara

4.

Figure 2 shows an authentication method.

Rajah 2 menunjukkan satu kaedah pengesahan.(Pahang 2013)

State the authentication method used in Figure 2.

Nyatakan kaedah pengesahan yang digunakan dalam Rajah 2

.

5. Example used in verifications methods is except ____________________Contoh yang digunakan dalam Kaedah Verifikasi kecuali _______________

(KERIAN PERAK 2013)A. Identification Card /Kad Pengenalan Diri

B. Security Token / Keselamatan token

C. Cell Phone / Telefon bimbit

D. Fingerprints Recognition / Pengesahan cap jari

SECTION C

1. Bank KITA intends to increase the level of security in some important bank, using the latest information technology. Through new methods such as fingerprint scanners, only authorized officer can walk into the area. You as the head of the Information Technology asked to manage the implementation.

Bank KITA bercadang untuk meningkatkan tahap keselamatan di beberapa bilik penting dalam bank tersebut, dengan menggunakan kaedah teknologi maklumat terkini. Melalui kaedah baru seperti pengimbas cap jari, hanya pegawai yang telah diberi kebenaran sahaja boleh memasuki kawasan tersebut. Anda sebagai ketua Unit Teknologi Maklumat diminta mengurus pelaksanaannya.

(Kelantan 2013 Set 3)(a) (i)State and explain the authentication method used.

Nyatakan dan jelaskan kaedah pengesahan yang telah digunakan.

[3Marks]

(ii)List 2 examples of the same method with the above underlined statement

Senaraikan 2 contoh kaedah yang sama dengan pernyataan bergaris di atas.

[2 Marks]

(b) Explain why authentication step is very important ?

Jelaskan mengapa langkah pengesahan adalah sangat penting?

[2 Marks]1.2.3 Controversial Contents and Control

1.2.3.1 List effects of controversial contents on society: Pornography Slander

SECTION A

1. Statement below is about controversial issue. Pernyataan di bawah adalah berkaitan isu kontroversi

(Bentong Pahang 2013)

Statement 2

Based on Statement 2 above,

Berdasarkan penyataan 2 di atas, (i) Azman has convicted ______________________Azman terlibat dalam perbuatan _____________________(ii) State another controversial content

Nyatakan satu lagi kandungan kontroversi

___________________________________SECTION B

1.Figure 13 shows controversial contents on society

Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.

(Pahang 2013)

Based on figure 13, give an effect towards our society:

Berdasarkan rajah 13, beri satu kesan terhadap masyarakat kita:

(i) X(ii) Y

[2 marks][2 markah]

1.2.3.2 Describe the process of filtering to control access to controversial contentsSECTION A

1. Figure 2 shows part of an algorithm for a web page filter.

Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

(SPM 2009)

Figure 2 / Rajah 2

State the filtering method used in the algorithm.

Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.

..

2. Figure 2 shows the display of an internet filtering software

Rajah 2 menunjukkan paparan pada satu perisian penapisan internet (SPM 2012)

Figure 2 / Rajah 2

Based on Figure 2 , state the method used

Berdasarkan rajah 2 nyatakan kaedah yang digunakan

.

3. Figure 1 shows the keyword blocking process

Rajah 1 menunjukkan proses penapisan kata kunci(SPM 2013)Figure 1 / Rajah 1

Based on figure 1 write A,B or C to match the following statement

Berdasarkan rajah 1, tuliskan A,B atau C untuk dipadankan dengan pernyataan berikut

i. Page download stops

Muat turun laman berhenti

ii. Search for banned words

Mencari perkataan-perkataan yang diharamkan

4. Table 1 shows the method of an Internet filtering.

Jadual 1 menunjukkan kaedah penapisan Internet. (Kelantan 2013 Set 5)XY

uses a list of banned words to block the page

menggunakan senarai perkataan terlaran untuk

halang laman

use software to list the web sites and

block the page

menggunakan perisian untuk

senaraikan laman web dan halang

laman

Table 1/Jadual 1

Based on Table 1, state the name of : / Berdasarkan Jadual 1, nyatakan nama :

(i)

X.........................................(ii)

Y.........................................5. State whether the following statements are True or False

Nyatakan sama ada pernyataan berikut Benar atau Palsu

(i) Keyword blocking uses a list of banned words or objectionable terms to block thePage completely./Sekatan kata kunci menggunakan senarai halangan perkataan atau bantahan terma untuk menghalangnya secara lengkap....................(ii) Site blocking can be done by setting the browser to only accept pages with certain level of ratings./Sekatan laman boleh dilakukan dengan menyediakan pelayar hanya untuk menerima lamandengan aras tertentu...................(Terengganu 2013)

SECTION B1.Figure 13 shows controversial contents on society

Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.

(Pahang 2013)

Based on figure 13, Z shows methods that can be used to prevent access to certain materials on the internet. Describe one of the methods used.

Berdasarkan rajah 13, Z menunjukkan kaedah-kaedah yang digunakan untuk menghalang capaian kepada kandungan internet yang tertentu.

Jelaskan satu kaedah yang digunakannya...

..

[2 marks][2markah]

SECTION C

1. En. Aaron is a schools ICT Coordinator. He has found some students were entering the ICT lab without permission and surfing pornography websites. Due to the incident, he plans to use the web filtering as shown in the Figure 10.

En. Aaron merupakan Penyelaras ICT sekolah. Beliau mendapati beberapa orang pelajar telah masuk ke makmal ICT tanpa kebenaran dan melayari beberapa laman web porno. Lantaran itu, beliau bercadang menggunakan kaedah penapisan laman web seperti dalam Rajah 10.

(Kedah 2013)

Figure 11 / Rajah 11

(a) Based on the Figure 11; / Berdasarkan Rajah 11;

(i) Name the filtering method.

Namakan kaedah penapisan tersebut.[1 mark]/[1 markah](ii) Explain another filtering method.

Terangkan satu kaedah penapisan lain.[2 marks]/[2 markah]...................................................................................................(b) Describe two negative effects on students.

Huraikan dua kesan negatif terhadap pelajar tesebut. [4 marks]/ [4 markah]

......................................................................................................................

......................................................................................................................

......................................................................................................................1.2.4 Computer Crimes

1.2.4.1 Explain the need for Cyber Law.

SECTION A

1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi pengguna komputer

TRUE / FALSE

(SPM 2007)

1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement Theft Attacks

SECTION A

1. Which of the following statements are computer crimes?

Antara pernyataan berikut manakah adalah jenayah komputer?

(Kedah 2013)I Hacking / Penggodaman

II Computer Attack / Serangan Komputer

III Copyright Infringement / Pelanggaran Hak Cipta

IV Computer Fraud / Penipuan Komputer

AI, II and IIIB II, III and IVC II and IIID I, II, III and IV

SECTION B1. Based on 2 statement below, answer the questions.

Berdasrkan 2 pernyataan di abwah, jawab soalan.

a. Who has committed in computer crime? State the type of computer crime he/she

has committed. Justify you answer. [ 2 marks ]

Siapakah yang telah melakukan kesalahan jenayah komputer? Nyatakan jenis

jenayah komputer yang telah dilakukan. Berikan alasan anda.

b. State two reasons why do we need Cyber Law. [ 2 marks ]

Berikan dua alasan mengapa kita memerlukan Undang-undang Siber.

SECTION C1. The following is a text on computer crime in television station broadcasting.Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

(Kelantan 2013 Set 5)

Based on the text:

Berdasarkan teks itu:(a) State the computer crime that has been done by Dewi.

Nyatakan jenayah komputer yang telah dilakukan oleh Dewi.

...

[1 mark][1 markah]

(b) Explain why cyber laws are important for television station broadcasting.Terangkan mengapa undang-undang siber adalah penting untuk stesen penyiaran televisyen...

......

[2 mark][2 markah]

(c) Explain TWO ways from the human aspects to prevent the above crime

Terangkan DUA cara dari aspek kemanusiaan untuk mencegah jenayah di atas

..

......

[4 mark][4 markah]1.3 Computer Security

1.3.1 Definition

1.3.1.1 Define computer security.

1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security:

Malicious code Hacking Natural disaster Theft

SECTION A

1. Computer security is defined as

Keselamatan komputer didefinisikan sebagai

(Pahang 2013)

A.security measures used to protect the network system

Langkah-langkah keselamatan yang digunakan untuk melindungi sistem rangkaian.

B. any criminal activity that is related to the use of computers.

Apa sahaja aktiviti jenayah yang melibatkan penggunaan komputer.

C. protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.

Melindungi sistem komputer dan maklumat yang dimiliki terhadap capaian yang tidak sah kerosakan, kemusnahan atau pengubahsuaian.

D. storing data, program and other important documents in a place that will not affected by any major destruction.

Menyimpan data, program dan dokumen-dokumen penting di suatu tempat yangSelamat daripada kemusnahan besar.2. Figure 3 shows descriptions on computer threats.

Rajah 3 menunjukkan keterangan tentang ancaman komputer.

(Pahang 2013)

Based on Figure 3, match the computer threats. Write P, Q or R

Berdasarkan Rajah 3, padankan ancaman komputer. Tulis P, Q atau R

(i) Malicious Code.(ii) Hacking

.SECTION B1. Figure 12 shows a pop-up message to computer users.

Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer

(SPM 2011)

Figure 12 / Rajah 12

Based on Figure 12: / Berdasarkan Rajah 12:

(a) State two ways that causes the pop-up message to appear on the

computer screen.

Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di

skrin komputer.

[2 markah]

(b) State two kinds of serious damages if a user ignore the message.

Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.

[2 markah]2. Read the following warningBaca amaran berikut

(SPM 2013)

Based on the warning statement

Berdasarkan pernyataan amaran itu

a. Explain why the warning important

Terangkan mengapa amaran itu penting2 markah

b. i. What precaution should you take if you cannot follow the given warning?Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak dapat mematuhi amaran yang diberi?

1 markah

ii. Justify your answer

Beri justifikasi jawapan anda

1 markah

SECTION C1. Figure 20 shows symptoms of a computer problem

Rajah 20 menunjukkan simptom pada sebuah komputer.

(SPM 2010)

Screen displays unusual messagesSkrin memaparkan mesej pelik

Files become corrupted

Fail menjadi rosak

Fies mysteriously appear

Muncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20

Based on Figure 20: / Berdasarkan Rajah 20:

(a) Identify the type of computer threat which matches the symptoms.

Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.

i. .State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.

ii. i.

(b) Describe two reasons why the computer may have been affected by the threat in (a).

Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).

Suggest two ways to prevent it.

Cadangkan dua cara untuk mengatasinya.

.................................................................................................

.................................................................................................

.................................................................................................1.3.3 Security Measures

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

1.3.3.2 Apply the correct security procedures:

Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects

SECTION A

1.

Figure 3 shows how cryptography works

Rajah 3 menunjukkan bagaimana kriptografi bekerja.

(SPM 2007)

Name H : / Namakan H : 2. Table 2 shorws the steps of using anti-virus software which is not in the

correct sequence.

Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.

(SPM 2011)

Complete the step. Step 1 and 3 are given.

Lengkapkan langkah itu. Langkah I dan 3 diberi.

Choose anti virus software/Pilih perisian anti virus(i) 1

Take necessary action /Ambil tindakan yang perlu(ii) ..

Scan the selected area /Imbas kawasan yang dipilih(iii) 3

Select area to be scanned /Pilih kawasan yang akan diimbas(iv) ..

Table 2 /Jadual 2

(ii)(iv)

3. Ali has send a confidential file to Sandra using email. Rearrange the activities carried out

by Ali in the correct sequence.

Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semulaaktiviti yang dijalankan oleh Ali mengikut urutan yang betul.

(SPM 2013)

P Decrypt file

Menyahsulit file

Q Open file received to view contents

Buka fail yang diterima untuk melihat kandungan

R Select file to send

Pilih fail yang akan dihantar

SEncrypt file

Enkripsi fail

TAttach file to email

Kepilkan fail pada email

4. TWINKLE company seeks your advice to protect their network resources from outsides and to restrict employees access to sensitive data such as payroll or personal records.

Syarikat TWINKLE meminta nasihat anda bagi melindungi sumber rangkaian dari pihak luar dan menyekat pekerja dari mencapai data yang penting seperti gaji dan rekod peribadi.

What procedure you would suggest to them.

Apakah prosedur yang anda boleh cadangkan kepada mereka. (Kelantan 2013 Set 1)A. Antivirus / Antivirus

B. Anti-spyware / Anti spyware

C. Data backup / Sandaran dataD. Firewall / Tembok Api5. Azman Company seeks your advice to protect their network resources from outsider and to restrict employees access to sensitive data such as payroll or personal records. What procedures you would suggest to them.Syarikat Azman meminta nasihat anda untuk melindungi sumber rangkaian dari pencerobohan luar dan menghalang pekerja daripada mencapai data yang sulit seperti pembayaran gaji dan rekod individu. Apakah prosedur yang anda perlu cadangkan kepada mereka.

(Pahang 2013)A. Antivirus

B. Anti-spyware

C. Data backup

D. Firewall

6. Figure 1(a) and Figure 1(b) show the problems faced when surfing the internet.

Rajah 1(a) dan Rajah 1(b) menunjukkan masalah yang dihadapi semasa melayari internet.

(KERIAN PERAK 2013)

Lots of unwanted pop-up windows while surfing the When you want to download a file, your

internet.

Computer does not allow it to happen.

Banyak tetingkap yang tidak diigini keluar semasa Semasa anda ingin memuat turun fail, komputer melayari internet.

anda tidak membenarkannya.

Figure 1(a)

Figure 1(b)

Rajah 1(a)

Rajah 1(b)

Based on Figure 1(a) and Figure 1(b), match the problems above according to the correct

security measures:

Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan langkah

keselamatan yang betul:

(i) Figure 1(a). Rajah 1(a)

(ii) Figure 1(b). Rajah 1(b)

7. Table 1 shows types of security measures.

Jadual 1 menunjukkan jenis-jenis langkah keselamatan.Antivirus

Antivirus

Firewall

Tembok Api

Cryptography

Kriptografi

P

QR

Table 1 / Jadual 1

(Terengganu 2013)

Based on Table 1, match the correct security measures to overcome the problem below by writing P, Q or R.

Berdasarkan Jadual 1, padankan langkah-langkah keselamatan bagi mengatasi masalah di bawah dengan menulis P, Q atau R.

(i) Identify and remove any computer viruses found.

Mengenalpasti dan membuang sebarang virus komputer yang ditemui.

................

(ii) Block unauthorized access while permitting authorized communication.

Menghalang capaian yang tidak dibenarkan manakala membenarkan komunikasiyang dibenarkan.

.................

SECTION B

1. Read the following situation:

Baca situasi berikut:Wilayah 2013

Figure 13

Rajah 13(a) (i)What was happened to the club members list file?

Apakah yang berlaku pada fail senarai nama ahli kelab ICT?

(iii) What should Nelly do before she open the file?

Apakah yang perlu dilakukan oleh Nelly sebelum membuka fail tersebut?

(b) (i) State the step should be taken by Nelly to prevent this problem?

Nyatakan langkah yang perlu diambil oleh Nelly untuk mencegah masalah ini?

(ii) Based on b (i), give one example of utility software that can be use.

Berdasarkan b (i), berikan satu contoh perisian utiliti yang bolehSEMAKAN

TarikhTopik / Sub topikTanda tangan

GuruCatatan

1.2 Introduction to Information Technology1.1.2 Overview of Information and Communication Technology (ICT)

1.1.2.1 Define ICT.

1.1.1.3 Describe the brief evolution of computers.

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.

1.1.2.2 State the differences between computerised and non-computerised systems.

1.1.2.3 State the impact of ICT on society.

1.2 Computer Ethics and Legal Issues

1.2.1 Definition

1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws.

1.2.2 Privacy

1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/technologies.

1.2.3 Controversial Contents and Control

1.2.3.1 List effects of controversial contents on society: Pornography Slander

1.2.3.2 Describe the process of filtering to control access to controversial contents.

1.2.4 Computer Crimes

1.2.4.1 Explain the need for Cyber Law.

1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement Theft Attacks

1.3 Computer Security

1.3.1 Definition

1.3.1.1 Define computer security.

1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security: Malicious code Hacking Natural disaster Theft

1.3 Computer Security

1.3.3 Security Measures

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

1.3.3.2 Apply the correct security procedures: Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects

System A

System B

Sistem B

All transactions are done by computers

Semua traksaksi dilakukan dengan komputer

Transaction can be done anytime and anyplace

Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana

Example of transactions is electronic funds transfer

Contoh transaksi adalah pemindahan wang elektronik

education before ict

Pembelajaran sebelum menggunakan ICT

education with ict

Pembelajaran menggunakan ICT

Ali has been appointed by his teacher to help other teachers to key in the test score into school HC3 Examination Program. Without his teacher knowledge he had changed his ICTs subject marks from 40% to 75%. As a result of the actions he has successfully passed the subject.

Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan markah peperiksaan ke Program Peperiksaan HC3 sekolahnya. Tanpa pengetahuan gurunya beliau telah mengubah markah subjek ICTnya dari 40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan cemerlang subjek tersebut.

Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them

Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau mengelakkan hasil dan maklumat mereka digunakan.

Authentication methods

Kaedah pengesahan

P

Q

Taxi services booking / tempahan perkhidmatan teksi

Purchase using credit card / pembelian menggunakan kad kredit

- Retinal scanning /

pengimbasan retina

- voice recognition /

Pengecaman suara

Figure 2/Rajah 2

Azman is a Muslim. One day, he received a spam e-mail stating that his favourite drink Power-B uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends.

Azman beragama Islam. Suati hari beliau menerima email spam menyatakan minuman kegemarannya Power B menggunakan bahan pewarna makanan tidak halal, namun Azman tidak tahu sumber tersebut benar atau tidak. Azman mengambil keputusan menyebarkan email tersebut kepada 50 orang rakannya.

Fazli wrote an e-mail that a fellow classmate was having an affair with a teacher, even though it was not true. Fazli then sent it to five other friends.

Fazli telah menulis satu emel yang menyatakan seorang rakan sekelasnya mengadakan hubungan dengan seorang guru, Fazli telah menghantar emel tersebut kepada lima orang rakan

X

Z

X Rated Video

Do not enter

Y

FILTERING SETTINGS

Restricted List

HYPERLINK "http://www.seperti.com" http://www.seperti.com

http://www.jalan.com

ADD

REMOVE

EXIT

START

User access a web page

Contained banned words?

STOP

A

B

C

YES

NO

Fazli wrote an e-mail that a fellow classmate was having an affair with a teacher, even though it was not true. Fazli then sent it to five other friends.

Fazli telah menulis satu emel yang menyatakan seorang rakan sekelasnya mengadakan hubungan dengan seorang guru, Fazli telah menghantar emel tersebut kepada lima orang rakan

X

Z

X Rated Video

Do not enter

Y

Julia has purchased a commercial application software and she uploads the software to her web site for others to download it.

Julia telah membeli perisian aplikasi komersil dan dia telah memuat naik perisian itu ke laman webnya bagi membolehkan orang lain memuat turunnya.

Johan has downloaded an open source application software from the Internet. He then duplicates the software and distributes to his friends.

Johan telah memuat turun perisian aplikasi sumber terbuka dari Internet.Kemudian, dia membuat salinan perisian tersebut dan mengedarkan kepada rakan-rakannya.

Dewi works as an editor in one of the larger private television broadcasting in Malaysia.

She uses her expertise in ICT for editing the television programs in order to preserve the

quality before they were broadcast by the television station. Without companys permission

Dewi has made copies of the television programs and sells it via Internet.

Dewi bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen

swasta yang terbesar di Malaysia. Dewi menggunakan kepakarannya dalam bidang ICT

untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Dewi turut membuat

salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet

tanpa pengetahuan majikannya.

Computer program that perform unauthorised processes on a computer or a network

Program komputer yang melaksanakan proses-proses yang tidak dibenarkan pada suatu komputer atau suatu rangkaian

Unauthorised access to a computer system or network

Capaian yang tidak dibenarkan terhadap suatu sistem komputer atau rangkaian

Computer is used to steal money, goods, information or resources

Komputer digunakan untuk mencuri wang, barangan, maklumat atau sumber.

R

Q

P

Figure 3/Rajah 3

Never open an email attachment unless you are expecting the attachment and it is from the trusted source

Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan tersebut dan ia datang dari sumber yang dipercayai

Plaintext

H

Plaintext

Encrypt

Decrypt

ANTIVIRUS

FIREWALL

ANTISPYWARE

As a new secretary of ICT Club, Nelly wanted to copy the club members list from the computer in ICT room to her laptop using thumb drive. While opening the file, suddenly she saw a pop up message as shown in Figure 13.

Sebagai setiausaha Kelab ICT yang baru, Nelly mahu menyalin senarai nama ahli kelab dari komputer di bilik ICT ke komputer ribanya dengan menggunakan thumb drivenya. Semasa membuka fail tersebut, tiba-tiba dia melihat mesej pop-up seperti yang ditunjukkan dalam Rajah 13.

[email protected] ( http://rmmict.blogspot.com )