PPT T4 2015 answer.doc
-
Upload
norhidayah-ali -
Category
Documents
-
view
220 -
download
1
Transcript of PPT T4 2015 answer.doc
SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015
Skema Jawapan Bahagian A
Question No.No. Soalan
Candidate’s AnswerJawapan Calon
MarksMarkah
1 i Communication/ Komunikasi 1
ii Processing/ Pemprosesan 2
2 i P 3
ii R 4
3 D 5
4 Computerised system/ Sistem berkomputer 6
5 D 7
6 B 8
7 Ethics/Etika/Computer Ethics/ Etika Komputer 9
8 False /Palsu 10
9 Firewall/ Tembok Api 11
10 D 12
11 i Slander/ Fitnah 13
ii Pornography/ Pornografi 14
12 i A 15
ii C 16
13 i S 17
ii Q 18
14 C 19
15 C 20
16 i Data Backup / Salinan Data 21
ii Anti-virus 22
17 D 23
18 Output 24
19 i T 25
ii F 26
20 i Primary Storage/ Storan Primer 27
ii Secondary storage/ Storan Sekunder 28
21 D 29
22 Gigabyte/ Gigabait 30
23 i A 31
ii D 32
24 i 2 33
ii 1 34
25 i False/ Palsu 35
ii True/ Benar 36
PPT/SMKDHK 2015
SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015Skema Jawapan Bahagian BNo Jawapan Markah
26 a)
1. Privacy law
2. utilities software
b)
1. Any biometric devices other than fingerprint recognition and iris scanning.
2. Authentication is important in order to safeguard against the unauthorised
access and use.
2 marks
1 mark
1 mark
27 a)
Identify
- Copyright Infringement.
Justification
-Install anti-virus software
-scan files for viruses before downloading.
b) Any 1 relates answer
1. Fraud
2. Theft
3. Attacks
1 mark
2 marks
1 mark
28 a) Bencana alam –kerosakan ke atas system computer disebabkan oleh bencana alam
seperti banjir,kebakaran,gempa bumi dan lain-lain lagi
b) malicious code, hacking and theft.
( Any related answer )
3 marks
1 mark
29 (a) P = Process Q = Storage
(b)
Primary storage Secondary storage
It stores data and programs that can
be accessed directly by the processor
It stores data and programs for future use
RAM is volatile which means the
programs and data in RAM are lost
when the computer is powered off.
It is non-volatile, which means that it does
not need power to maintain the information
stored in it.
1 mark
1 mark
2 marks
PPT/SMKDHK 2015
SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015
PRIMARY SECONDARY STORAGE
Mobility
Fix in the computer
Tetap didalam
komputer
Transferable between computer
Boleh berpindah antara
komputer
Capacity
Muatan
Limited capacity
( 512MB, 2GB)
Unlimited ( up to 200 GB)
Tidak terhad
Examples ROM, RAM Floppy disk, hard disk , thumb
drive, DVD
Price
Expansive
Mahal
Cheaper then primary storage
Murah berbanding Storan Primer
Accesibility
Capaian
Easy , fast, direct
Mudah,pantas dan secara
terus
Need to be connected to the
computer
Perlu disambung ke komputer
( Any related answer )
30 a.)
i. A = Magnetic medium/ Media magnetik
ii. B = Optical medium/ Media optik
b)( Answer : Need one different ony )
B ( Optical Medium ) C ( Flash Memory )
Price
Harga
Cheaper
Murah
Expensive
Mahal
Access time
Masa capaian
Slower
Perlahan
Faster
Laju
( Any related answer )
1 mark
1 mark
2 marks
Skema Jawapan Bahagian CItems Ques Skema Marks
31 (a) a -i) Data backup
a-ii)
1.Pilih fail yang ingin dijadikan backup – Pilih Fail Presentation1.pptx daripada
desktop.
1
2
PPT/SMKDHK 2015
SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /20152.Salin fail dan masukkan dalam peranti simpanan yang lain
– Copy Fail Presentation1.pptx daripada desktop ke F:/
3.Atau mana-mana jawapan yang sesuai untuk data backup
(b) - ANTIVIRUS
Antivirus melindungi komputer daripada serangan virus dengan
mengenalpasti dan membuang virus dari komputer.
-ANTI-SPYWARE
Spyware ialah program yang memasuki komputer tanpa pengetahuan
tuan punya /pengguna. Ianya mengumpul maklumat mengenai pengguna
tersebuat secara rahsia
-CRYPTOGRAPHY/ Tulisan Rahsia
Kriptografi ialah proses menyembunyikan maklumat dengan mengubah
bentuk maklumat asal kepada bentuk yang lain.
- FIREWALL
Firewall ialah perkakasan atau perisan yang berfungsi dalam rangkaian
komputer bertujuan menghalang sesetengah komunikasi yang telah
disekat/dihalang oleh polisi keselamatan. Ia mungkin menghadkan capaian kepada
pengguna atau untuk aktiviti tertentu sahaja.
-HUMAN ASPECTS / Aspek manusia
Aspek manusia merujuk kepada pengguna dan juga penceroboh sistem
komputer. Aspek yang susah untuk dilindungi.
4
32 (a)
System A System B
Depends stirictly on teachers and
textbook
More interesting and interactive
experiences
No or limited technology in the
teaching and learning process
Enhanced learning
4
PPT/SMKDHK 2015
SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015or any other relevant answers
(b) 1. Faster communication speed
- news or messages are sent via email to anyone efficiently.
- any information can travel fast and at an instant.
2. Lower communication cost
- allows access to large amount of data at a very low cost
- cost of connection is relatively cheap
3. Paperless environment
- information can be stored and retrieve through a digital medium.
or any other relevant answers
1
1
1
33 (a) i. P = Expansion slot/ Slot Tambahan
ii. R = CPU Slot/ CPU Socket/ Slot CPU
1
1
(b) RAM slot/ Slot RAM 1
(c)
Figure 4(b)/RAM Figure 4(c)/ROMData and program Stores during and after
processingStored by manufacturer
Content Stores information temporarily
Stores instructions (Information) permanently
Processing time Very fast, but uses a lot of power
Fast, but uses very little power
Volatility Volatile Non-volatile
4
PPT/SMKDHK 2015