Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP...

28
Section A Bahagian A [36 marks] [36 markah] Answer all the questions. Write your answers in the space provided on the Answer Sheet. Each answer carries one mark. Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah. 1. Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of ICT usage in _______________ sector. ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICT dalam bidang _______________. 2. Figure 1 shows one of the authentication method. Rajah 1 menunjukkan salah satu kaedah pengesahan. Figure 1 Rajah 1 Based on Figure 1, Berdasarkan Rajah 1, Identify the authentication method. Kenalpasti kaedah tersebut. 3. State whether the following statements is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. (i) Privacy means that we have the right not to disclose our personal details.

Transcript of Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP...

Page 1: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

Section ABahagian A[36 marks]

[36 markah]

Answer all the questions. Write your answers in the space provided on the Answer Sheet.Each answer carries one mark.Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah.

1. Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of ICT usage in _______________ sector.

ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICT dalam bidang _______________.

2. Figure 1 shows one of the authentication method.Rajah 1 menunjukkan salah satu kaedah pengesahan.

Figure 1Rajah 1

Based on Figure 1,Berdasarkan Rajah 1,

Identify the authentication method.Kenalpasti kaedah tersebut.

3. State whether the following statements is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu.

(i) Privacy means that we have the right not to disclose our personal details. Hak peribadi bermaksud kita ada hak untuk tidak mendedahkan maklumat peribadi.

(ii) E-banking makes buying and selling activities faster and more efficient through internet.Perbankan elektronik membolehkan aktiviti belian dan jualan lebih cepat dan berkesan melalui internet.

Page 2: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

4. Information may come in various forms such as ________.Maklumat diperoleh dari pelbagai bentuk seperti ________.

I. Reading /BacaanII. Investigation / Penyiasatan

III. Study / TinjauanIV. Research / Kajian

A. I and IIB. II and IIIC. II, III and IVD. All the above

5. Table 1 below shows computer ethics. Based on table, select A, B, C or D for the following statements Jadual 1 di bawah menunjukkan etika komputer. Berdasarkan jadual, pilih A, B, C atau D untuk pernyataan-pernyataan berikut.

Computer Ethics Computer Crime Code of Ethics Code of Crime

A B C D

Table 1Jadual 1

I. Is a system of moral standard or moral values used as a guideline for computer user Adalah sistem standard moral atau nilai moral digunakan sebagai panduan untuk pengguna computer.

II. Is guidelines in ICT that help determine whether a specific computer action ethical or unethical. Satu panduan dalam ICT yang membantu bagi menentukan sesuatu “computer action” beretika atau tidak.

6. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.

I. Unix is an example of cross platform operating system. Unix adalah contoh sistem operasi rentas-pelantar.

II. Providing a user interface is one of the functions of OS. Menyediakan antaramuka pengguna merupakan satu fungsi bagi sistem operasi.

III. Users do not need to memorise all the syntax to issue command in Graphical User Interface. Pengguna tidak perlu mengingati semua sintaks untuk memberi arahan dalam antaramuka pengguna bergrafik.

Page 3: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

7. Which of the following statement is true about networks? Manakah antara pernyataan berikut benar mengenai rangkaian?

A. People in various places can be connected through a local area network.Pengguna di merata tempat boleh dihubungkan melalui rangkaian kawasan setempat.

B. Networking technology allows banking to be done anywhere and at any time.Teknologi rangkaian membolehkan urusan perbankan boleh dilakukan di mana sahaja pada bila-bila masa.

C. A long distance communication can only be done in a virtual private network.Komunikasi Jarak Jauh hanya boleh dilakuakan dalan rangkaian persendirian maya..

D. A network that links computers from one building to another is known as Metropolitan Area Network.Rangkaian yang menghubungkan komputer dari satu bangunan ke bangunan yang lain dikenali sebagai Rangkaian Kawasan Metropolitan.

8. Table 2 shows statements about types of user interface.Jadual 2 menunjukkan pernyataan tentang jenis antaramuka pengguna.

User interface XAntaramuka X

User interface X requires a user to type commands or pressspecial keys on the keyboard to enter data and instructions thatinstruct the operating system what to do.Antaramuka X memerlukan pengguna menaip arahan ataumenekan kekunci khas pada papan kekunci untuk memasukkandata dan arahan yang mengarah sistem pengoperasian apa yangperlu dibuat.

User interface YAntaramuka Y

User interface Y makes use of the computer’s graphicscapabilities to make the operating system and program easier touse.Antaramuka Y menggunakan keupayaan grafik komputer untukmembolehkan sistem operasi dan program mudah digunakan.

Table 2Jadual 2

Based on Table 2, state the type of user interfaceBerdasarkan Jadual 2, nyatakan jenis antara muka pengguna

I. X II. Y

Page 4: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

9. Statement 1 shows function of storage.Pernyataan 1 menunjukkan fungsi storan.

Data and program will disappear when the power is turned off. Program dan data akan hilang apabila bekalan elektrik ditutup.

Statement 1Pernyataan 1

Statement 1 describes:Pernyataan 1 menerangkan tentang:

A. RAMB. ROMC. CD – RD. Diskette

10 A/An ____________________ is a core set of programs that control and supervise the hardware of the computer and provide services to other system software, application software, programmer, and a computer user. _____________________ set program yang mengawal dan mengawasi peralatan komputer dan memberikan perkhidmatan kepada perisian sistem, perisian aplikasi, pengaturcara dan pengguna komputer.

A. Utility system Sistem Utiliti

B. Computer software Perisian Komputer

C. Operating system Sistem Pengendali

D. Programming language Bahasa Pengaturcaraan

Page 5: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

11.

Figure 2Rajah 2

Based on Figure 2 above, name the component to be inserted into slot. Berdasarkan Rajah 2 di atas, namakan komponen yang dimasukkan ke dalam slot

A. X.B. Y

12. Statement 2 below is the statment of network communication technology. Pernyataan 2 di bawah adalah pernyataan tentang teknologi komunikasi rangkaian.

Statement 2Pernyataan 2

Name the network communication technology in statement 2 Nyatakan teknologi komunikasi rangkaian dalam pernyataan 2.

A. Internet B. Intranet C. Ethernet D. Extranet

X

Y

It is a private network within an organization .Organization use this technology to provide information to their employees

Ia adalah rangkaian persendirian dalam satu organisasi. Organisasi menggunakan teknologi ini untuk menyalurkan maklumat kepada perkerjanya.

Page 6: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

13 Write the word that would complete the following statement:Tulis perkataan yang dapat melengkapkan pernyataan berikut.

_________ refers to a computer’s ability to run more than one application at the same time._________ merujuk kepada keupayaan komputer melaksanakan lebih dari satu aplikasi pada masa yang sama.

14 State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.

I. A network is a collection of computers and devices connected together via communications devices and transmission media.Rangkaian ialah satu koleksi komputer dan peranti yang dihubungkan bersama melalui peranti komunikasi dan media penghantaran.

II. Using E-Business system, customer can pay bills, browse account balance and transfer money without going to the bank. Menggunakan sistem E-Perniagaan, pelanggan boleh membayar bil, menyemak baki akaun dan memindahkan wang tanpa perlu ke bank.

15. Table 3 shows types of protocols.Jadual 3 menunjukkan jenis-jenis protokol.

PHypertext Transfer Protocol (HTTP)Protokol Pemindahan Hiperteks

QTransmission Control Protocol (TCP)Protokol Pengawalan Penghantaran

RInternet Protocol (IP)Protokol Internet

Table 3Jadual 3

Based on Table 3, match the protocol with the following statement by writing P, Q or R.Berdasarkan Jadual 3, padankan protokol dengan pernyataan berikut dengan menulis P, Q atau R.

I. This protocol ensures the delivery of information packets across network.Protokol ini memastikan penghantaran paket maklumat melalui rangkaian.

II. This protocol is responsible for providing logical addressing called IP address to route information between networks. Protokol ini bertanggungjawab menyediakan alamat logikal yang dipanggil

alamat IP untuk perjalanan maklumat antara rangkaian.

Page 7: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

16 Table below shows examples of operator symbols that being used in programming.

Jadual di bawah menunjukkan contoh simbol-simbol operator yang digunakan dalam

pengaturcaraan.

S ‘ OR ‘ ‘ AND’

T ‘ * ‘ ‘ + ‘

U ‘ < ‘ ‘ > ‘

Table 4Jadual 4

Based on table above, write S, T or U for the following operator types. Berdasarkan jadual di atas, tuliskan S, T atau U bagi jenis-jenis operator berikut:

i. Logical Operator Operator Logik

ii. Mathematical Operator Operator Matematik

17 The lowest level of programming language is

Bahasa pengaturcaraan aras terendah ialah

A. BASICBASIC

B. Natural languageBahasa Tabii

C. Machine languageBahasa Mesin

D. Assembly languageBahasa Penghimpun

Page 8: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

18. Table 5 shows several terms in a computer system.Jadual 5 menunjukkan beberapa terminologi dalam sistem komputer.

ASafe SoftwarePerisian selamat

BSecondary Storage DevicePeranti Storan

CCommand-Line User InterfaceAntaramuka Arahan Baris

D Proprietary Software Perisian Berlesen

Table 5Jadual 5

Based on Table 5, write A, B, C , or D for the following question.Berdasarkan Jadual 5, tuliskan A, B, C atau D untuk soalan berikut.

i. Jasdeep wants to continue his assignment later. He wants to save his assignment. What device should Jasdeep use?Jasdeep hendak menyambung tugasannya kemudian, dia hendak menyimpan tugasannya. Apakah peranti yang akan digunakan oleh Jasdeep?

ii. This software also known as closed source software. It offers a stable system with support if the software fails or malfunction.Perisian ini juga dikenali sebagai perisian sumber tertutup. Ia merupakan sistem yang stabil dan mempunyai sokongan sekiranya perisian ini gagal berfungsi.

19. Write the words that would complete the following statement: Tulis perkataan yang dapat melengkapkan pernyataan berikut:

_________________ approach is a computer programming technique in which the program is divided into modules.Pendekatan _____________ adalah teknik pengaturcaraan komputer di mana aturcara dibahagi kepada beberapa modul.

20. Complete the following statements by filling in the blanks: Isikan ruang kosong untuk melengkapkan pernyataan berikut:

The process of detecting, locating and correcting logic errors is called _____.Proses mengesan, mencari dan memperbaiki kesalahan logik disebut ______.

Page 9: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

21 Mail merge allows users to create personalized BCantuman mel membenarkan pengguna menghasilkan

I LettersSurat

II LabelsLabel

III VoicesSuara

IV EnvelopesEnvelop

A. I, II, III

B. I, II, IV

C. II, III, IV

D. All the above

22. Which of the following combination of multimedia elements and its standard format file is correct? Yang mana berikut, gabungan elemen multimedia dan format fail piawai yang betul?

Multimedia elements Standard File Format

AGraphicsGrafik

.avi

BAudioAudio

.midi

CVideoVideo

.au

DTextTeks

.gif

Table 6Jadual 6

Page 10: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

analysis

analysis

analysis

analysis

analysis

analysis

Publishing

Analysis

P

Implementation

Testing

Q

23. A multimedia development company wants to develop a multimedia presentation projectfor 53th National Day.Satu syarikat pembangunan multimedia ingin membangunkan satu projek persembahan multimedia untuk Hari Kebangsaan Ke 53.

Figure 3 shows the six step of multimedia production phases. Rajah 3 menunjukkan enam fasa pembangunan multimedia.

Figure 3Rrajah 3

Based on the figure 3,Berdasarkan rajah 3,

Name the multimedia production phases :Namakan fasa pembangunan multimedia :

(i) P &

(ii) Q

Page 11: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

24 Question 24 and 25 base on figure 4

Soalan 24 dan 25 berdasarkan rajah 4

Figure 4 shows table of students’ address and students’ order used in SMK Putrajaya BookShop System.

Rajah 4 menunjukkan jadual alamat murid dan pesanan murid yang digunakan dalam Sistem Kedai Buku SMK Putrajaya.

Table: Student AddressJadual: Alamat Murid

Table: OrderJadual: Pesanan

Figure 4Rajah 4

Identify the data type field address for Student Address table.

Kenalpasti jenis data bagi medan address bagi jadual Alamat Murid.

25 Name the foreign key field for Order table.

Namakan medan kekunci asing bagi jadual Pesanan.

Page 12: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

Section B

Bahagian B

[ 20 marks ]

[ 20 markah ]

This section consists of five questions. Answer all questions.

Bahagian ini mengandungi lima soalan. Jawab semua soalan.

26. Read the following situation:Baca situasi berikut:

(a) (i) State the type of computer crime that Romli committed.Nyata jenis jenayah komputer yang dilakukan oleh Romli.

(ii) Give a reason for your answer.Beri satu alasan bagi jawapan anda. [2 marks]

(b) What has happened to Romli’s computer ? How to prevent his computer from problems ?Apa yang telah berlaku pada komputer Romli ? Bagaimanakah dapat mengatasi masalah komputer tersebut? [2 marks]

Romli like to spends her free time surfing the internet. He always downloads film, proprietary software , MP4, MP3 songs and sells them to his friends. He uses his ICT skill to get the unauthorized password and serial code for the software. One day he found that his computer screen display unusual message and imej and some file become corrupted.

Romli selalu meluangkan masa lapangnya melayari Internet. Dia sering memuat turun filem, perisian dan lagu untuk dijual kepada rakannya. Dia menggunakan kepakaran ICTnya untuk mendapatkan no siri yang tidak sah bagi perisian yang dimuat turun. Pada satu hari Romli mendapati komputernya memaparkan imej dan mesej yang aneh dan beberapa fail pada komputer sudah rosak.

Page 13: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

27. Figure 5 shows examples of components computer hardware. A computer system needs to have this hardware to function.

Rajah 5, menunjukkan contoh-contoh perkakasankomputer. Sistem komputer memerlukan perkakasan ini untuk berfungsi.

Based on figure 5,

Berdasarkan Rajah 5,

Draw complete a computer hardware block diagram. [4 marks]

Lukis dengan lengkap gambarajah blok perkakasan komputer.

Component BComponent A

Component DComponent C

Figure 5Rajah 5

Page 14: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

XX

28. Based on Figure 6, answer the following questions.

Berdasarkan Rajah 6, jawab soalan-soalan berikutnya.

(a) Suggest a suitable device for X in Figure 6 and state its function.

Cadangkan peranti yang sesuai untuk X bagi Rajah 6 dan nyatakan fungsinya.

[2 marks]

(b) Explain the security measures to be taken by Company TRK to protect data from

being accessed by unauthorized users.

Terangkan langkah keselamatan yang perlu diambil oleh Syarikat TRK untuk

melindungi data daripada diakses oleh pengguna yang tidak sah. [2 marks]

Figure 6Rajah 6

Company TRK

Page 15: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

MultimediaBMultimedia A

29. Figure 7 shows interfaces of two multimedia aplications. Both projects were presented to a panel of evaluators. As a result, multimedia B gets more attention from the evaluators.

Rajah 7 menunjukkan antaramuka dua aplikasi multimedia. Kedua-dua projek dibentang kepada panel penilai. Akhirnya, multimedia B mendapat lebih perhatian daripada penilai.

Both images represent user interface of multimedia aplication.

Kedua-dua imej mewakili antaramuka pengguna bagi aplikasi multimedia.

(a) Identify the type of interactivity in;

Kenalpasti jenis interaktiviti dalam;

Multimedia A MultimediaBFigure 7Rajah 7

Page 16: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

(i) Multimedia A

(ii) Multimedia B

(b) Give two reasons why Multimedia B more popular than Multimedia A.

Berikan dua sebabkenapa MultimediaB lebih popular berbanding MultimediaA.

[2 marks]

[2 marks]

Page 17: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

Print “X is greater than Y”

Read X, Y

Start

End

Print “X is less than Y”X > Y

TRUE

FALSE

30. Figure8 showsone of thetoolsinthe development phase ofthe programRajah 8 di bawah menunjukkansalah satu tool dalam fasa pembangunanprogram

Based on the flow chart above, answer the following questions:

Berdasarkan carta aliran di atas, jawab soalan-soalan berikut:

a) There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol.Terdapatkesilapan dalamsimbol carta alirandi atas.Kenal pastidengan melukis semula simbol yang betul. [2 marks]

b) (i) Name the phase that involve the flow chart above. [1 mark ]Namakanfasayang terlibat dengancarta alirandi atas.

(ii) What is the output if X = 12 and Y = 13 ? [1 mark ]

Apakah outputjikaX =12 danY =13 ?

Figure 8Rajah 8

Page 18: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

Section C

Bahagian C

[14 marks]

[14 markah]

This section consists of three questions.Answer two questions only:

Bahagian ini mengandungi tiga soalan. Jawab dua soalan sahaja:

(i) Question 31, and

Soalan 31, dan

(ii) Question 32 or Question 33.

Soalan 32 atau Soalan 33.

Page 19: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

31. SMK Hang Jebat will launch Cyberkids club to give exposure to the students about the importance of ICT in the present. For the facilitate the business of registration member of the club, one system member's information need to be built for keep data-data member of the club in in the database.

SMK HANG JEBAT akan melancarkan Kelab CyberKids bagi memberi pendedahan kepada para pelajar tentang kepentingan ICT pada masa kini. Untuk memudahkan urusan pendaftaran ahli kelab, satu sistem maklumat ahli perlu dibina bagi menyimpan data-data ahli kelab di dalam pangkalan data.

Table7 shows a part of his database file.

Jadual7 menunjukkan sebahagian fail pangkalan datanya.

Based on Table7:

Berdasarkan Jadual7:

(a) Which field is primary key?

Medan manakah merupakan kekunci primer?

Justify your answer.

Berikan justifikasi kepada jawapan anda.

[ 3 marks]

(b) Design data entry form that relates to the contents of the table.

Reka bentuk borang kemasukan data yang berkaitan dengan kandungan

jadual tersebut.

[ 4 marks]

Table7Jadual7

NoAhli Nama Tingkatan Jawatan TarikhDaftar Alamat

CK0001 Suria wahida bt ali 5 Alfa Pengerusi 3/01/2013 Wakaf Bharu

CK0002 Intan syuhada bt mokhtazar 5 Alfa Bendahari 3/01/2013 Tumpat

CK0003 Muhammad alif b azmi 5 Alfa S/USAHA 3/01/2013 Pasir Pekan

CK0004 Amir Aizat Bin Aziz 4 Beta Ahli 6/01/2013 Kutan

CK0005 Fatin Nurbaya Bt Abu 3 Adil Ahli 10/01/2013 Wakaf Bharu

CK0006 Hasslina Binti Awang 2 Budi Ahli 15/01/2013 Tumpat

Page 20: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

32. Intan Syuhada, manager ICT Department of EduTech College is given the responsibility to set up a computer laboratory with 20 PCs for the college. Intan Syuhada was informed by the college that it is running on low budget for software installations. As the manager of ICT Department, Intan Syuhada will have to look for suitable software type and operating system to be used at the college at minimal cost.

Intan Syuhada, pengurus Jabatan ICT EduTech College diberi tanggungjawab untuk menubuhkan sebuah makmal komputer dengan 20 PC untuk kolej. Intan Syuhada dimaklumkan oleh pihak kolej yang ia sedang berjalan pada bajet yang rendah untuk pemasangan perisian. Sebagai pengurus Jabatan ICT, Intan Syuhada perlu mengenalpasti jenis perisian dan sistem operasi yang bersesuaian untuk digunakan di kolej pada kos yang minimum.

(a) (i) What type of software should Intan Syuhada choose? Justify your answer.

Apakah jenis perisian harus Intan Syuhada pilih? Jelaskan jawapan anda

[2 marks]

(ii) State one example operating system mentioned in (a)

Nyatakan satu contoh sistem operasi yang disebut dalam (a) [1 mark]

(b) Describe two advantages of using software type mentioned in (a).

Jelaskan dua kelebihan menggunakan jenis perisian yang disebut dalam (a).

[4 marks]

Page 21: Perisian selamat - Web viewThis protocol is responsible for providing logical addressing called IP address to route ... Which of the following combination of multimedia elements and

33. Bank KITA intends to increase the level of security in some important bank, using the latest information technology. Through new methods such as fingerprint scanners, only authorized officer can walk into the area. You as the head of the Information Technology asked to manage the implementation.

Bank KITA bercadang untuk meningkatkan tahap keselamatan di beberapa bilik penting dalam bank tersebut, dengan menggunakan kaedah teknologi maklumat terkini. Melalui kaedah baru seperti pengimbas cap jari, hanya pegawai yang telah diberi kebenaran sahaja boleh memasuki kawasan tersebut. Anda sebagai ketua Unit Teknologi Maklumat diminta mengurus pelaksanaannya.

(a) (i) State and explain the authentication method used.

Nyatakan dan jelaskan kaedah pengesahan yang telah digunakan.

[3Marks]

(ii) List 2 examples of the same method with the above underlined statement

Senaraikan 2 contoh kaedah yang sama dengan pernyataan bergaris di atas.

[2 Marks]

(b) Explain why authentication step is very important ?

Jelaskan mengapa langkah pengesahan adalah sangat penting? [2 Marks]