JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware,...
Transcript of JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware,...
JAWAPAN KERTAS 1 ICT SPM 2010
SECTION A
NO SOALAN JAWAPAN1. (i) C
(ii) A2. (i) Communication/communicating
(ii) software3. (R) text
(S) video/audio/graphic/image/picture4. False5. A6. (R) word processor / desktop publisher
(S) spreadsheets / database7. False 8. False9. True10. (X) Router / gate way11. True12. Presentation 113. (P) graphics/pictures/image/photo
(Q) video14. Audio editor / sound editor15. A16. Implementation 17. (X) 2nd generation programming language, 2GL
(Y) 1st generation programming language, 1GL18. (S) C19. (i) variable
(ii) constant20. (X) string
(Y) double / single21. (i) sequence / repetition
(ii) selection22. (H) field / attribute
(I) file / table 23. DBMS24. (i) avoid duplicate values
(ii) to relate the tables25. A
SECTION B
26. (a) (i) cheaper / free (ii) Convenience
(b) 3 reasons:(i) Can send big messages / long message(ii) Secure(iii) Can attach file(vi) Cheaper(v) Can attach video / picture / audio (1M for each answer)
27. (a) String / text. Reason – it contains non numerical characters / because have dash(-) symbol
(b) Selection control structureJustify: can evaluate years of experience of an employee and determine whether the employee is entitle for RM1000 bonus. Or if year of experience is grater or equal to 3 years the employee is paid RM 1000 bonus.
28. (a) Company X = WAN (Wide Area Network), it covers a large geographical area such Phuket, Ipoh, Kuala Lumpur, Kuching and Kota Kinabalu.
(b) (i) Extranet. (ii) Justify: - receive orders and payment electronically
- Extranet is private network because Company Z is customer.
29. (a) (i) easy to learn (ii) Easy to use (iii) Can view final produce while editing (iv) No need to have HTML language / no programming required (v) WYSIWYG
(b) (i) change colours of text or text background (ii) Reduce the umber of colours used (iii) Text needs to change font style (iv)Readable font (v) Frame too thick (vi)Rearrange the text
30. (a) (i) DBMS / OS / ticketing program ? Web browser (ii) Computer / any hardware that connected to the online ticketing program.
(b) Interrelation component A and E: - Customer refers to the user guide and learnt hoe to use the ticketing program
SECTION C
31.
1 mark for: - Begin and End
- Correct symbol (input, output, process) - Logic flow
32. (a) Malicious code attack. 2 examples: virus, spyware, adware, browser hijacker, Trojan horse, worm (b) 2 reasons: - user open infected files - user runs infected program - no anti spyware installed - no antivirus installed - used infected storage devices.
BEGIN
READ/GET Salesman, Basic Salary, Monthly
Sales
Monthly Income = 5/100 X Monthly Sales + Basic Salary
END
PRINT/DISPLAY Monthly Income
1 mark
1 mark
1 mark for formula + 1
mark for correct formula
2 ways to prevent: - install antivirus - scan the files before using - update antivirus - install firewall - scan storage devices - do not open attach file from unknown persons/sources
33. (a) 4 activities:(i) interviewing headmaster/teacher/examination secretary(ii) collecting data samples(iii) Defining the requirements – input, process. Output(iv) Proposing procedures flow for the system.
(b) (i) Logic error. (ii) The expected grade is C. since the output Gred is D, it is due to wrong logic or wrong formula.