PPT T4 2015 answer.doc

7
SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015 Skema Jawapan Bahagian A Question No. No. Soalan Candidate’s Answer Jawapan Calon Marks Markah 1 i Communication/ Komunikasi 1 ii Processing/ Pemprosesan 2 2 i P 3 ii R 4 3 D 5 4 Computerised system/ Sistem berkomputer 6 5 D 7 6 B 8 7 Ethics/Etika/Computer Ethics/ Etika Komputer 9 8 False /Palsu 10 9 Firewall/ Tembok Api 11 10 D 12 11 i Slander/ Fitnah 13 ii Pornography/ Pornografi 14 12 i A 15 ii C 16 13 i S 17 ii Q 18 14 C 19 15 C 20 16 i Data Backup / Salinan Data 21 ii Anti-virus 22 17 D 23 18 Output 24 19 i T 25 ii F 26 20 i Primary Storage/ Storan Primer 27 ii Secondary storage/ Storan Sekunder 28 21 D 29 22 Gigabyte/ Gigabait 30 23 i A 31 ii D 32 PPT/SMKDHK 2015

Transcript of PPT T4 2015 answer.doc

Page 1: PPT T4 2015 answer.doc

SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015

Skema Jawapan Bahagian A

Question No.No. Soalan

Candidate’s AnswerJawapan Calon

MarksMarkah

1 i Communication/ Komunikasi 1

ii Processing/ Pemprosesan 2

2 i P 3

ii R 4

3 D 5

4 Computerised system/ Sistem berkomputer 6

5 D 7

6 B 8

7 Ethics/Etika/Computer Ethics/ Etika Komputer 9

8 False /Palsu 10

9 Firewall/ Tembok Api 11

10 D 12

11 i Slander/ Fitnah 13

ii Pornography/ Pornografi 14

12 i A 15

ii C 16

13 i S 17

ii Q 18

14 C 19

15 C 20

16 i Data Backup / Salinan Data 21

ii Anti-virus 22

17 D 23

18 Output 24

19 i T 25

ii F 26

20 i Primary Storage/ Storan Primer 27

ii Secondary storage/ Storan Sekunder 28

21 D 29

22 Gigabyte/ Gigabait 30

23 i A 31

ii D 32

24 i 2 33

ii 1 34

25 i False/ Palsu 35

ii True/ Benar 36

PPT/SMKDHK 2015

Page 2: PPT T4 2015 answer.doc

SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015Skema Jawapan Bahagian BNo Jawapan Markah

26 a)

1. Privacy law

2. utilities software

b)

1. Any biometric devices other than fingerprint recognition and iris scanning.

2. Authentication is important in order to safeguard against the unauthorised

access and use.

2 marks

1 mark

1 mark

27 a)

Identify

- Copyright Infringement.

Justification

-Install anti-virus software

-scan files for viruses before downloading.

b) Any 1 relates answer

1. Fraud

2. Theft

3. Attacks

1 mark

2 marks

1 mark

28 a) Bencana alam –kerosakan ke atas system computer disebabkan oleh bencana alam

seperti banjir,kebakaran,gempa bumi dan lain-lain lagi

b) malicious code, hacking and theft.

( Any related answer )

3 marks

1 mark

29 (a) P = Process Q = Storage

(b)

Primary storage Secondary storage

It stores data and programs that can

be accessed directly by the processor

It stores data and programs for future use

RAM is volatile which means the

programs and data in RAM are lost

when the computer is powered off.

It is non-volatile, which means that it does

not need power to maintain the information

stored in it.

1 mark

1 mark

2 marks

PPT/SMKDHK 2015

Page 3: PPT T4 2015 answer.doc

SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015

PRIMARY SECONDARY STORAGE

Mobility

Fix in the computer

Tetap didalam

komputer

Transferable between computer

Boleh berpindah antara

komputer

Capacity

Muatan

Limited capacity

( 512MB, 2GB)

Unlimited ( up to 200 GB)

Tidak terhad

Examples ROM, RAM Floppy disk, hard disk , thumb

drive, DVD

Price

Expansive

Mahal

Cheaper then primary storage

Murah berbanding Storan Primer

Accesibility

Capaian

Easy , fast, direct

Mudah,pantas dan secara

terus

Need to be connected to the

computer

Perlu disambung ke komputer

( Any related answer )

30 a.)

i. A = Magnetic medium/ Media magnetik

ii. B = Optical medium/ Media optik

b)( Answer : Need one different ony )

B ( Optical Medium ) C ( Flash Memory )

Price

Harga

Cheaper

Murah

Expensive

Mahal

Access time

Masa capaian

Slower

Perlahan

Faster

Laju

( Any related answer )

1 mark

1 mark

2 marks

Skema Jawapan Bahagian CItems Ques Skema Marks

31 (a) a -i) Data backup

a-ii)

1.Pilih fail yang ingin dijadikan backup – Pilih Fail Presentation1.pptx daripada

desktop.

1

2

PPT/SMKDHK 2015

Page 4: PPT T4 2015 answer.doc

SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /20152.Salin fail dan masukkan dalam peranti simpanan yang lain

– Copy Fail Presentation1.pptx daripada desktop ke F:/

3.Atau mana-mana jawapan yang sesuai untuk data backup

(b) - ANTIVIRUS

Antivirus melindungi komputer daripada serangan virus dengan

mengenalpasti dan membuang virus dari komputer.

-ANTI-SPYWARE

Spyware ialah program yang memasuki komputer tanpa pengetahuan

tuan punya /pengguna. Ianya mengumpul maklumat mengenai pengguna

tersebuat secara rahsia

-CRYPTOGRAPHY/ Tulisan Rahsia

Kriptografi ialah proses menyembunyikan maklumat dengan mengubah

bentuk maklumat asal kepada bentuk yang lain.

- FIREWALL

Firewall ialah perkakasan atau perisan yang berfungsi dalam rangkaian

komputer bertujuan menghalang sesetengah komunikasi yang telah

disekat/dihalang oleh polisi keselamatan. Ia mungkin menghadkan capaian kepada

pengguna atau untuk aktiviti tertentu sahaja.

-HUMAN ASPECTS / Aspek manusia

Aspek manusia merujuk kepada pengguna dan juga penceroboh sistem

komputer. Aspek yang susah untuk dilindungi.

4

32 (a)

System A System B

Depends stirictly on teachers and

textbook

More interesting and interactive

experiences

No or limited technology in the

teaching and learning process

Enhanced learning

4

PPT/SMKDHK 2015

Page 5: PPT T4 2015 answer.doc

SKEMA PEPERIKSAAN PERTENGAHAN TAHUN TINGKATAN 4 /2015or any other relevant answers

(b) 1. Faster communication speed

- news or messages are sent via email to anyone efficiently.

- any information can travel fast and at an instant.

2. Lower communication cost

- allows access to large amount of data at a very low cost

- cost of connection is relatively cheap

3. Paperless environment

- information can be stored and retrieve through a digital medium.

or any other relevant answers

1

1

1

33 (a) i. P = Expansion slot/ Slot Tambahan

ii. R = CPU Slot/ CPU Socket/ Slot CPU

1

1

(b) RAM slot/ Slot RAM 1

(c)

Figure 4(b)/RAM Figure 4(c)/ROMData and program Stores during and after

processingStored by manufacturer

Content Stores information temporarily

Stores instructions (Information) permanently

Processing time Very fast, but uses a lot of power

Fast, but uses very little power

Volatility Volatile Non-volatile

4

PPT/SMKDHK 2015