JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware,...

5
JAWAPAN KERTAS 1 ICT SPM 2010 SECTION A NO SOALAN JAWAPAN 1. (i) C (ii) A 2. (i) Communication/communicating (ii) software 3. (R) text (S) video/audio/graphic/image/picture 4. False 5. A 6. (R) word processor / desktop publisher (S) spreadsheets / database 7. False 8. False 9. True 10. (X) Router / gate way 11. True 12. Presentation 1 13. (P) graphics/pictures/image/photo (Q) video 14. Audio editor / sound editor 15. A 16. Implementation 17. (X) 2 nd generation programming language, 2GL (Y) 1 st generation programming language, 1GL 18. (S) C 19. (i) variable (ii) constant 20. (X) string (Y) double / single 21. (i) sequence / repetition

Transcript of JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware,...

Page 1: JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware, browser hijacker, Trojan horse, worm (b) 2 reasons: - user open infected files - user

JAWAPAN KERTAS 1 ICT SPM 2010

SECTION A

NO SOALAN JAWAPAN1. (i) C

(ii) A2. (i) Communication/communicating

(ii) software3. (R) text

(S) video/audio/graphic/image/picture4. False5. A6. (R) word processor / desktop publisher

(S) spreadsheets / database7. False 8. False9. True10. (X) Router / gate way11. True12. Presentation 113. (P) graphics/pictures/image/photo

(Q) video14. Audio editor / sound editor15. A16. Implementation 17. (X) 2nd generation programming language, 2GL

(Y) 1st generation programming language, 1GL18. (S) C19. (i) variable

(ii) constant20. (X) string

(Y) double / single21. (i) sequence / repetition

(ii) selection22. (H) field / attribute

(I) file / table 23. DBMS24. (i) avoid duplicate values

(ii) to relate the tables25. A

Page 2: JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware, browser hijacker, Trojan horse, worm (b) 2 reasons: - user open infected files - user

SECTION B

26. (a) (i) cheaper / free (ii) Convenience

(b) 3 reasons:(i) Can send big messages / long message(ii) Secure(iii) Can attach file(vi) Cheaper(v) Can attach video / picture / audio (1M for each answer)

27. (a) String / text. Reason – it contains non numerical characters / because have dash(-) symbol

(b) Selection control structureJustify: can evaluate years of experience of an employee and determine whether the employee is entitle for RM1000 bonus. Or if year of experience is grater or equal to 3 years the employee is paid RM 1000 bonus.

28. (a) Company X = WAN (Wide Area Network), it covers a large geographical area such Phuket, Ipoh, Kuala Lumpur, Kuching and Kota Kinabalu.

(b) (i) Extranet. (ii) Justify: - receive orders and payment electronically

- Extranet is private network because Company Z is customer.

29. (a) (i) easy to learn (ii) Easy to use (iii) Can view final produce while editing (iv) No need to have HTML language / no programming required (v) WYSIWYG

(b) (i) change colours of text or text background (ii) Reduce the umber of colours used (iii) Text needs to change font style (iv)Readable font (v) Frame too thick (vi)Rearrange the text

30. (a) (i) DBMS / OS / ticketing program ? Web browser (ii) Computer / any hardware that connected to the online ticketing program.

(b) Interrelation component A and E: - Customer refers to the user guide and learnt hoe to use the ticketing program

Page 3: JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware, browser hijacker, Trojan horse, worm (b) 2 reasons: - user open infected files - user

SECTION C

31.

1 mark for: - Begin and End

- Correct symbol (input, output, process) - Logic flow

32. (a) Malicious code attack. 2 examples: virus, spyware, adware, browser hijacker, Trojan horse, worm (b) 2 reasons: - user open infected files - user runs infected program - no anti spyware installed - no antivirus installed - used infected storage devices.

BEGIN

READ/GET Salesman, Basic Salary, Monthly

Sales

Monthly Income = 5/100 X Monthly Sales + Basic Salary

END

PRINT/DISPLAY Monthly Income

1 mark

1 mark

1 mark for formula + 1

mark for correct formula

Page 4: JAWAPAN KERTAS 1 ICT SPM 2010 - RMM ICT GROUP · Web view2 examples: virus, spyware, adware, browser hijacker, Trojan horse, worm (b) 2 reasons: - user open infected files - user

2 ways to prevent: - install antivirus - scan the files before using - update antivirus - install firewall - scan storage devices - do not open attach file from unknown persons/sources

33. (a) 4 activities:(i) interviewing headmaster/teacher/examination secretary(ii) collecting data samples(iii) Defining the requirements – input, process. Output(iv) Proposing procedures flow for the system.

(b) (i) Logic error. (ii) The expected grade is C. since the output Gred is D, it is due to wrong logic or wrong formula.