koleksi soalan negeri bab_1
TRANSCRIPT
-
8/11/2019 Koleksi Soalan Negeri Bab_1
1/35
1
INTRODUCTION OF ICT)
pengenalan kepada ict
NAMA :
TINGKATAN : ..
1.1 Introduction to Information Technology
1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1Define ICT.
1.1.1.2Describe the brief evolution of computers.
SECTION A
-
8/11/2019 Koleksi Soalan Negeri Bab_1
2/35
2
1. State the name of the first generation computer.
Nyatakan nama komputer generasi pertama (SPM 2008)
2. Figure 1 shows three technologies used in the generations of computers
Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
(SPM 2010)
Based on Figure 1, write A, B or C to
match the following:
Berdasarkan Rajah l, tulis A, B atau C
untuk dipadankan dengan berikut:
(i) Second Generation /
Generasi Kedua
...................
(ii) Third Generation /
Generasi Ketiga
.
Figure 1 / Rajah 1
3.. Complete the following statement: / Lengkapkan pernyataan berikut.
Information and Communication Technology is the use of computers,( i)
...........................devices and( ii) ......;:......................applications for processing,storing, retrieving, protecting and transmitting information from anywhere at
anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i)
......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan ,
mencapai semula, melindungi dan menghantar maklumat dari mana-mana
tempat pada bila-bila masa. (SPM 2010)
4. The computers for this generation use magnetic drums as storage media and are
large in size, taking up entire room. They use a great deal of electricity, generating
a lot of heat, which is often the cause of malfunctions.
Komputer-komputer generasi ini menggunakan drum magnetik sebagai mediasimpanan yang besar dalam ukuran sehingga memuatkan satu bilik. Ia juga
menggunakan banyak tenaga elektrik, menghasilkan banyak haba dan kerap
menyebabkan kerosakan.
(Hulu Perak 2012)
Name the technology used for this generation of computers.
Namakan teknologi yang digunakan dalam generasi komputer ini.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
3/35
3
..
1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.
SECTION A
1. In an advanced ICT modemization, but there are positive and negative effects on
the use of ICT. Which ofthe following non-negative impact on the use of ICT on
society.
Di dalam arus pemodenan ICT yang maju, nqmttn terdapat kesan posittf dan juga
kesan negatif terhadap penggunaan ICT. Antara berikut yang-manakah bukan
kesan negative terhadap penggunaan ICT terhadap masyarakat.
(Kelantan 2012)
A. Personal information will be easily exposed and this will make no privacy of
personal information.
Maklumat peribadi seseorang akan mudah terdedah dan ini akan
membuatkan tiada privasi terhadap maklumat diri.
B. Unethical use ofICT will lead to computer crime.
Penggunaan ICT yang tidak beretika akon menyebabkan berlakunya
jenayah komputer
C. A person can get various information from various sources.
Seseorang boleh mendapatkan pelbagai maklumat daripada pelbagai
sumber
D. Some users of ICT as a waste of time but might be limited solely
entertainment.Sebahagian pengguna ICT membuang masa kerana hanyalah mencari
hiburan semata-mata.
2. Complete the following statement:
Lengkapkan pernyataan berikut:
Table 1 is regarding to the use of ICT in everyday life.
Jadual 1 merujuk kepada penggunaan TMK dalam kehidupan seharian.
(MERSING JOHOR 2012)
All transactions are done by computers
Semua traksaksi dilakukan dengan komputer
Transaction can be done anytime and anyplace
Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana
Example of transactions is electronic funds transfer
Contoh transaksi adalah pemindahan wang elektronik
-
8/11/2019 Koleksi Soalan Negeri Bab_1
4/35
4
Table 1 /Jadual 1
Table 1 refer to the use of ICT in ______________________ sector.
Jadual 1 merujuk kepada penggunaan ICT dalam sector _______________.
1.1.2.2 State the differences between computerised and non-computerised systems.
SECTION B
1. Figure 6 shows a situation in a banking system. /
Rajah 6 menunjukkan situasi di dalam sistem bank. (Kedah 2012)
Figure 6 / Rajah 6
Based on Figure 6:/Berdasarkan Rajah 6:
(a) State the difference betweensystem A and system B.
Nyatakan perbezaan di antara sistem A dan sistem B.
[2 marks][2 markah]
1.1.2.3 State the impact of ICT on society.
SECTION A
System A System B
-
8/11/2019 Koleksi Soalan Negeri Bab_1
5/35
5
1. Which of these is an impact of slander towards society?
Yang manakah kesan kepada fitnah terhadap masyarakat?
(P.Pinang 2012)
A Closer relationship / Hubungan lebih rapatB Trust among people / Kepercayaan di antara manusia
C Higher moral behaviour / Perlakuan moral lebih tinggi.
D Bad reputation of people / Reputasi buruk pada seseorang.
2. ICT has brought many positive impacts on society.
ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)
Figure 1/ Rajah 1
Based on Figure 1, state one positive impact of ICT on society
Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat
I. Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjimatkan masa dansumber
II. Inappropriate online communication with unknown person through the
Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet
III. Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
IV. Effective sharing slander and false content
Perkongsian fitnah dan penipuan kandungan yang efektif
A. I and II B. I and III C. II and IV D. III and IV
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer
Crime and Cyber Law.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
6/35
6
SECTION A
1. Computer ethics refers to the / Etika Komputer merujuk kepada
(Kedah 2012)
I study about moral principal for computer user.
kajian mengenai nilai moraluntuk pengguna komputer.
II custom that guides human behavior in cyber world.
budaya yang membimbing tingkah laku manusiadalam dunia siber.
III regulation that must be obeyed by the public.
peraturan yang perlu dipatuhi oleh orang awam.
IV knowledge about what is good and what is bad when using computer.
pengetahuan mengenai apa yang baik dan apa yang buruk apabila
menggunakan komputer.
A I, II and III / I, II dan III B I, II and IV / I, II dan IV
C I, III and IV / I, III dan IV D II, III and IV / II, III dan IV
2.. Table 1 shows the characteristics of X and Y in computer usage guideline.
Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan
komputer.
(SPM 2011)
X Y
Moral guidelines for computer users.
Garis panduan moral untukpenggLrna komputer.
Rules for computer users.
Peraturan-peraturan untuk penggunakomputer.
No penalty or punishment.
Tiada penalti atau hukuman.
Penalties or punishments imposed.
Penalti atau htLkuman dikenakan.
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i) X
(ii) Y
3. Table I below shows the number of terms of security threats.
Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.(Kelantan 2012)
A Piracy / Cetak rompak
B Natural disaster / Bencana Alam
C Malicious code / Kod Hasad
D Hacking / Pengodam
-
8/11/2019 Koleksi Soalan Negeri Bab_1
7/35
7
Tabel I /Jadual I
Ahmad had downloaded the songs online and make copies for sale to the
public..
Ahmad telah memuat turun laguJagu di atas talian dan membuat salinanuntuk dijual kepada orang ramai
4. Figure 2 shows Intellectual Property types.
Rajah 2 menunjukkan jenis-jenis Harta Intelek. (Wilayah 2012)
Figure 2 / Rajah 2
Based on Figure 2, state X and Y.
Berdasarkan Rajah 2, nyatakan X dan Y.
X: .
Y: .
SECTION B
1. Figure 6 shows a situation in a banking system. /
Rajah 6 menunjukkan situasi di dalam sistem bank.
(Kedah 2012)
Figure 6 / Rajah 6
Based on Figure 6:/Berdasarkan Rajah 6:
X Y
Intellectual property
Harta Intelek
System A System B
-
8/11/2019 Koleksi Soalan Negeri Bab_1
8/35
8
State two reasons why bank clients who use system B should be protected
under the Malaysian Cyber Law.
Nyatakan dua sebab mengapa pelanggan bank yang menggunakan sistem B
harus dilindungi di bawah Undang-undang Siber Malaysia.
[2 marks][2 markah].
.
.
1.2.1.2 Differentiate between ethics and law.
SECTION A
1. State whether the following statement is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu
(P..Pinang 2012)
We need computer ethics and laws to guide users from misusing the computer.
Kita memerlukan etika dan undang-undang komputer sebagai panduan kepada
pengguna supaya tidak menyalahgunakan komputer.
2. Choose the false statement about ethics and law
Pilih penyataan yang salah tentang etika dan undang-undang.
(Wilayah 2012)
Ethics LawA. Universal / universal Depend on country / Bergantung
kepada sesebuah Negara
B. Crime /Jenayah Immoral / Todak bermoral
C. Free to follow / Bebas diikuti Must follow /Mesti diikuti
D. Guide the users / Panduan
kepada pengguna
Control the users /Mengawal
pengguna
1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION A
1. Table 1 shows terms of computer ethics and legal issues.
Choose the correct term for each given statement.
(Wilayah 2012)
Jadual 1 menunjukkan istilah bagi etika komputer dan isu-isu perundangan.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
9/35
9
Pilih istilah yang betul bagi setiap pernyataan berikut.
Intellectual
Property
Privacy Computer
Crime
Table 1 /Jadual 1
i. Protect ideas, inventions, unique names, business models, industrial
processes, computer program codes and more.
Melindungi idea, ciptaan, nama-nama unik, model perniagaan, proses
perindustrian, kod program komputer dan lain-lain.
.
ii. The right of individuals and companies to deny or restrict the collection and
use of data and information about them.
Hak individu dan syarikat dalam menafikan atau membataskan
penggunaan data dan maklumat tentang mereka.
.
2. Choose the correct answer.
Pilih jawapan yang betul.
(Hulu Perak 2012)
Intellectual Property /
Harta Intelek
Privacy /
Privasi
Copyright /
Hak cipta
The right of individuals to control the collection and use of information about
themselves refers to the right of _____________________________.
Hak individu untuk mengawal pengumpulan dan penggunaan maklumat
mengenai diri mereka merujuk kepada ___________________________.
SECTION B
1. The following is a statement on information privacy.
Pernyataan berikut berkaitan keperibadian maklumat
(SPM 2007)
Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) .
ii) .
iii) .
iv) ..
Information privacy refers to the right of individuals and organisations to deny
or restrict the collection and use the information about them
Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk
menafi atau mengelakkan hasil dan maklumat mereka digunakan.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
10/35
10
1.2.2.2 State authentication and verification methods/technologies.
SECTION A
1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenisperanti biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i) State the name of the device. / Nyatakan nama peranti itu.
(ii) State the function of the device / Nyatakan fungsi peranti itu.
2. Figure I5(a) and Figure I5(b) show biometric authentication methods.
Rajah I5(a) dan Rajah 15(b) menunjukkan kaedah pengesahan biometrik.
(Kelantan 2012)
Figure 15(a) / Rajah 15(a) Figure 15(b) / Rajah 15(b)
Based on Figure l5(a) and Figure I 5(b) state the method used
Berdasarkan Rajah 15 (a) dan Rajah I5(b), nyatakan kaedah yang digunakan.
(i) Figure 15(a) / Rajah 15(a) ..
(i) Figure 15(b) / Rajah 15(b) ..
3. Example used in verification methods is except ________________
Contoh yang digunakan dalamKaedah verikfikasi kecuali______________
-
8/11/2019 Koleksi Soalan Negeri Bab_1
11/35
11
(Pahang 2012)
A Identification Card /Kad Pengenalan diri
B Security Token / Keselamatan token
C Cell Phone / Telefon bimbit
D Fingerprint Recognition / Pengesahan cap jari
4. State whether the following is True or False.
Nyatakan sama ada penyataan berikut Benar atau Palsu.
(Perlis 2012)
(i) A fingerprint is an imprint made by the pattern of the skin on the pad of a
human finger.
Cap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit
manusia.
5. Figure 1 shows three authentication and verification methods.
Rajah 1 menunjukkan tiga kaedah pembuktian dan pengesahan.
(Trengganu 2012)
Figure 1 / Rajah 1
Based on Figure 1, write A, B or C to match the following statements:
Berdasarkan Rajah 1, tuliskan A, B atau C untuk memadankan pernyataan berikut:
(i) This method provides the ability to deliver a signature to an organisation.
Kaedah ini menyediakan kebolehan untuk menghantar tandatangan
kepada organisasi. ....
(ii) This method requires users to place their hand onto a scanner surface.
Kaedah ini memerlukan pengguna untuk meletakkan tangan ke ataspermukaan pengimbas. ..
6. Figure 1 shows information on two types of authentuication methods.
Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan
(SPM 2012)
Authentication methods
Kaedah pengesahan
-
8/11/2019 Koleksi Soalan Negeri Bab_1
12/35
12
Based on figure 1 , state the name of / berdasarkan rajah 1, namakan
i. P .. ii. Q .
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society: Pornography Slander
SECTION A
1. Table 2 shows the effects of controversial content on society.
Jadual 2 menunjukkan kesan-kesan isu kontroversial dalam masyarakat.
(Wilayah 2012)
Table 2 /Jadual 2
State the type of controversial content on society.
Nyatakan jenis bagi isu kontroversial dalam masyarakat.
SEC
TIO
N B
1.
Lead to sexual addiction.
Mendorong ketagihan seks.
Lead to perversion
Mendorong sifat penyumbalewengan
Increase in rape cases
Peningkatan kadar kes rogol
-
8/11/2019 Koleksi Soalan Negeri Bab_1
13/35
13
Statement 1 / Pernyataan 1 (P.Pinang 2012)
Based on Statement 1, answer the following questions:
Berdasarkan Pernyataan 1, jawab soalan-soalan berikut:
a) State the controversial content that stated in Statement 1. Justify your
answer.
Senaraikan satu kandungan kontroversi yang dinyatakan dalam pernyataan
Justifikasikan jawapan anda. [2 marks][2 markah]
..
..
b) Give two negative impacts of Alis action to the fast food company.
Berikan 2 kesan negatif perbuatan Ali terhadap syarikat makanan segera
tersebut. [2 marks][2 markah]
..
..
1.2.3.2 Describe the process of filtering to control access to controversial contents
SECTION A
1. Figure 2 shows part of an algorithm for a web page filter.
Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
(SPM 2009)
-
8/11/2019 Koleksi Soalan Negeri Bab_1
14/35
14
Figure 2 / Rajah 2
State the filtering method used in the algorithm.Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..
2 Complete the following statement:/ Lengkapkan pernyataan berikut:
(Kedah 2012)
Ahmad and Ah Chong want to control the access to the controversial contents
before their kids use the Internet. Ahmad decides to use _______(i)_________
process. He lists the websites that he will block with Internet-filtering software. Ah
Chong chooses ______(ii)__________ process. He sets the browser to only accept
pages with certain level of ratings.
Ahmad dan Ah Chong mahu mengawal akses kepada kandungan kontroversi
sebelum anak mereka menggunakan Internet. Ahmad memutuskan untuk
menggunakan proses ______(i)__________. Beliau menyenaraikan laman-laman
web yang hendak disekat dengan menggunakan perisian tapisan Internet. Ah
Chong memilih proses ______(ii)__________. Beliau menetapkan pelayar web agar
hanya menerima halaman yang mempunyai tahap penilaian tertentu.
(i)
(ii)
3. State whether the following statements is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu
(Kelantan 2012)
Site blocking is aprivate combination of character associated with a username
..
Sekatan laman web adalah kombinasi rahsia aksara berkoitan dengan
nama pengguns
.
4. Figure 2 shows the display of an internet filtering software
-
8/11/2019 Koleksi Soalan Negeri Bab_1
15/35
15
Rajah 2 menunjukkan paparan pada satu perisian penapisan internet
(SPM 2012)
Figure 2 / Rajah 2
Based on Figure 2 , state the method used
Berdasarkan rajah 2 nyatakan kaedah yang digunakan
.
SECTION B1. Figure 16 below is an example of Internet filtering used by Puan Asiah to control
access of certain website.
Rajah 16 merupakan contoh Internet filtering yang digunakan oleh Puan Asiah
untuk mengawal capaian kepada laman web tertentu. (Wilayah 2012)
Figure 16 / Rajah 16
Based on Figure 16 : / Berdasarkan Rajah 16:Chat, Sex
Restricted List
http://www.seperti.com
http://www.jalan.com
ADD REMOVE EXIT
http://www.seperti.com/http://www.seperti.com/ -
8/11/2019 Koleksi Soalan Negeri Bab_1
16/35
-
8/11/2019 Koleksi Soalan Negeri Bab_1
17/35
17
Beri dua impak kandungan controversial dalam masyarakat
Malaysia.
................................................................................................................................
................................................................................................................................
[3 marks][3 markah]
(b) Give two preferred method of to limit access on the internet to filter
pornography content, and explain briefly.
Berikan dua cara yang sesuai untuk mengurangkan pencapaian ke internet
bagi menyaring bahan lucah and terangkan dengan ringkasnya.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[4 marks][4 markah]
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
SECTION A
1. Cyber law is a system of moral standards or values used as a guideline for
computer users. (T/F)
Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang
digunakan sebagai pedoman bagi pengguna komputer
TRUE / FALSE (SPM 2007)
2. Which of the following are related to the computer laws?Manakah yang berikut berkait dengan undang-undang komputer?
(Selangor 2012)
I. Depend on country and state where the crime is committed
Bergantung kepada negara dan negeri di mana jenayah berlaku
II. Prevent misuse of computers
Untuk mengelakkan penyalahgunaan komputer
III. Act as guideline to computer users
Panduan kepada pengguna komputer
IV. Can be applied anywhere
Boleh digunakan di mana-mana
A. I and II B. I and III C. II and IV D. III and IV
SECTION C
-
8/11/2019 Koleksi Soalan Negeri Bab_1
18/35
18
1. The following is a text on computer crime in television station broadcasting.
Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.
(N.Sembilan 2012)
Nora works as an editor in one of the larger private television broadcasting in
Malaysia. She uses her expertise in ICT for editing the television programs in order
to preserve the quality before they were broadcast by the television station.
Without companys permission Nora has made copies of the television
programs and sells it via Internet.
Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran
televisyen swasta yang terbesar di Malaysia. Nora menggunakan
kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga
mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman
rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa
pengetahuan majikannya.
Based on the text: / Berdasarkan teks itu:
Explain why cyber laws are important for television station broadcasting.
Terangkan mengapa undang-undang siber adalah penting untuk stesen
penyiaran televisyen. [2 marks] [2 markah]
................................................................................................................................
................................................................................................................................
................................................................................................................................
1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement Theft
Attacks
SECTION A
1. Figure 1 showing example of computer crime.
Rajah 1 menunjukkan contoh jenayah komputer.
(Pahang 2012)
.
X Y
-
8/11/2019 Koleksi Soalan Negeri Bab_1
19/35
19
Figure 1 / Rajah 1
Based on figure 1, state types of computer crimes in :
Berdasarkan rajah 1, nyatakan jenis jenayah komputer di:
(i) X
(ii)
Y
2. Fill in the blanks with the correct word.
Isi tempat kosong dengan perkataan yang betul.
(Terengganu 2012)
(i) Activities taken to disrupt the equipment of computer systems, change
processing control or corrupt stored data is called _____________ .
Aktiviti-aktiviti yang diambil untuk mengganggu peralatan sistem komputer,
mengubah pemproses kawalan atau data yang tersimpan rosak dipanggil
____________.
(ii) Transfering of payments to the wrong accounts is an example of
_____________ .
Pemindahan bayaran bagi akaun-akaun salah ialah satu contoh
_____________ .
SECTION B
1. Figure 8 shows issues and concern among internet users.
Rajah 8 menunjukkan isuisu dan kebimbangan dikalangan pengguna internet.
Figure 8 / Rajah 8(a) The above concerns and issues show the need of ....................
Kebimbangan dan isu-isu di atas menunjukkan keperluan
kepada........................ [1 mark][1 markah]
(b) Explain one of the computer crime which involve Legal status of Online
Transaction.
Terangkan satu daripada jenayah computer yang berkaitan dengan
transaksi atas talian
Integrity AndLegal Status Of
Privacy And confidentiallySecurity Of
-
8/11/2019 Koleksi Soalan Negeri Bab_1
20/35
-
8/11/2019 Koleksi Soalan Negeri Bab_1
21/35
21
SECTION C
1. The following is a text on computer crime in television station broadcasting.
Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.
(N.Sembilan 2012)
Nora works as an editor in one of the larger private television broadcasting in
Malaysia. She uses her expertise in ICT for editing the television programs in order
to preserve the quality before they were broadcast by the television station.
Without companys permission Nora has made copies of the television
programs and sells it via Internet.
Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran
televisyen swasta yang terbesar di Malaysia. Nora menggunakan
kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga
mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman
rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa
pengetahuan majikannya.
Based on the text: / Berdasarkan teks itu:
(a) State the computer crime that has been done by Nora.
Nyatakan jenayah komputer yang telah dilakukan oleh Nora.
. [1 marks][1markah]
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.SECTION A
1. Write True or False for the following statement :
Tuliskan Benar atau Palsu pada pernyataan berikut:
(Pahang 2012)
Computer security means protecting strangers to read our e-mail or use our
computer to attack other systems.
Keselamatan komputer bermakna melindungi orang yang tidak dikenali untuk
membaca e-mel atau menggunakan komputer kita untuk menyerang sistem lain.
.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
22/35
22
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
Malicious code Hacking Natural disaster Theft
SECTION A
1. Table I below shows the number of terms of security threats.
Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.
(Kelantan 2012)
A Piracy /Cetak rompak
B Natural disaster / Bencana Alam
C Malicious code / Kod Hasad
D Data backup / Salinan data
Tabel 1 /Jadual 1
Mr. Farid has made copies of all company data to be stored in a safe place
to avoid flooding..
En. Farid telah membuat salinan terhadap semua data syarikatnya untuk
disimpan di tempat yang selamat bagi mengelakkan dari banjir..
2. Table 1 shows the threats to computer security
Jadual 1 menunjukkan ancaman kepada keselamatan komputer
(Pahang 2012)
J Worm
K Hacking
L Nature / environment
M Theft
Table 1 /Jadual 1
Based on table 1, write J, K, L or M for suitable statement below:
Berdasarkan jadual 1, tulis J, K, L atau M untuk pernyataan yang sesuai di bawah:
(i) A program that can pass on the malicious code to other programs by
modifying them.
Satu program yang boleh memindahkan kod berniat jahat kepada
program-program lain dengan mengubah mereka.
(ii) Computer is used to steal goods and information..Komputer digunakan untuk mencuri barang-barang dan maklumat
-
8/11/2019 Koleksi Soalan Negeri Bab_1
23/35
23
3. State whether the following is True or False.
Nyatakan sama ada penyataan berikut Benar atau Palsu.
(Perlis 2012)
(i) A fingerprint is an imprint made by the pattern of the skin on the pad of a
human fingerCap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit
manusia..
(ii) Email with spam features is a service that receives email messages from
unrecognized sources..
Email dengan spam merupakan satu perkhidmatan menerima pesanan
email dari sumber yang tidak diketahui.
4. Match the statements (a) and (b) with the security threats in Table 1.
Padankan kenyataan (a) dan (b) dengan ancaman keselamatan dalam Jadual 1.
(P.Pinang 2012)
Security Threats /Ancaman Keselamatan
Malicious Kod / Kos Hasad
Hacker / Penggodam
Theft / Kecurian
Table 1 /Jadual 1
i. ________________ is the illegal taking of another person's property without that
person's permission
________________ adalah pengambilan secara haram harta orang lain tanpa
kebenaran.
ii. _______________ is any program code or script that is intended to causeundesired effects, security breaches or damage to a system.
_______________ adalah sebarang kodaturcara atau skrip yang bertujuan
Untuk menyebabkan kesan luar jangka, pencerobohan sekuriti atau
kerosakan pada sistem.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
24/35
24
SECTION B
1. Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer
(SPM 2011)
Figure 12 / Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a) State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
skrin komputer.
[2 markah]
(b) State two kinds of serious damages if a user ignore the message.Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.
[2 markah]
2. Figure l8 below shows symptoms of a computer problem.
Rajah 18 di bowah menunjukkan simptom pada sebuah komputer (Kelantan 2012)
O Screen displays unusual messages /
Skrin memaparkan mesej pelikO Files become corrupted /
Fail menjadi rosak
O Files mysteriously appear /
Muncul fail yang menjadi tanda tanya
Figure 18 / Rajah I8
-
8/11/2019 Koleksi Soalan Negeri Bab_1
25/35
25
Based on the figure above; / Berdasarkan rajah di atas ;
a) Identify thetype of computer threat which matches the symptoms.
Kenalpasti jenis ancaman komputer yang berpadanan dengan simptom itu.
State one different examples of the threat.
Nyotakan satu contoh berlainan bagi ancaman itu. (2m)i.
ii.
SECTION C
1. Figure 20 shows symptoms of a computer problem
Rajah 20 menunjukkan simptom pada sebuah komputer.
(SPM 2010)
- Screen displays unusual messages
Skrin memaparkan mesej pelik
- Files become corrupted
Fail menjadi rosak
- Fies mysteriously appear
Muncul fail yang menjadi tanda Tanya
Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
(a) Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom
itu.
i. .
State two different examples of the threat. / Nyatakan dua contoh berlainanbagi ancaman itu.
ii.
iii.
(b) Describe two reasons why the computer may have been affected by the
threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman
di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
..................................................................................................................................................................................................
.................................................................................................
-
8/11/2019 Koleksi Soalan Negeri Bab_1
26/35
26
2. Figure 11 is an excerpt from an online newspaper.
Rajah 11 menunjukkan petikan daripada akhbar atas talian
(Kedah 2012)
Figure 11 / Rajah 11
Based on Figure 11:/Berdasarkan Rajah 11:
Explain another two types of threats that may harm the government web site.
Terangkan dua jenis ancaman lain yang mungkin memudaratkan tapak web
kerajaan.
[4 marks][4 markah]
KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.
Deputy Information, Communications and Culture Minister Dato Joseph Salang
Gandum said this move followed the attacks on 198 websites, including
government portals, by the "Anonymous" hacker group last week.
"We have to set up stronger cyber security measures and ensure that government
websites are protected from such activities in the future."
(Straits Time; 21 June, 2011)
KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lamalagi bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi
dan Kebudayaan Dato Joseph Salang Gandummengatakan bahawa tindakan
ini berikutan daripada serangan ke atas 198 laman sesawang termasuk portal
kerajaan oleh kumpulan penggodam Anonymous minggu lepas.
Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh
dan memastikan laman-laman web kerajaan dilindungi pada masa akan
datang.
(Straits Time; 21 Jun ,2011)
-
8/11/2019 Koleksi Soalan Negeri Bab_1
27/35
27
3. Statement 2 shows computer security risk.
Pernyataan 2 menunjukkan risiko keselamatan komputer.
(Pahang 2012)
Statement 2
Pernyataan 2
Based on statement 2, / Berdasar kepada pernyataan 2,
State who is someone? Explain one category of someone.
Nyatakan siapaseseorang? Huraikan satu daripada kategoriseseorang
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer
threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects
SECTION A
1. Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)
Name H : / Namakan H :
2. Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Plaintext H PlaintextEncrypt Decrypt
Amirul need to submit his multimedia presentation on tomorrow
morning. While working on his computer, he discover some of
files missing and some altered. He realize that someonehave
accessed his computer, who commit or responsible to wrong
doing.
Amirul perlu menghantar persembahan multimedia pada
keesokan hari. Semasa membuat kerja di komputer, dia
mendapati beberapa fail telah hilang. Dia menyedari
seseorangtelah mengakses ke komputernya, orang yang
bertanggungjawab membuat kesalahan.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
28/35
28
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang
tidak mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.Choose anti virus software/Pilih perisian anti virus (i) 1
Take necessary action /Ambil tindakan yang perlu (ii) ..
Scan the selected area /Imbas kawasan yang dipilih (iii) 3
Select area to be scanned /Pilih kawasan yang akan diimbas (iv) ..
Table 2 /Jadual 2
(ii) (iv)
3. Figure 1(a) and Figure 1(b) show the problems faced when surfing the internet.
Rajah 1(a) dan Rajah 1(b) menunjukkan masalah yang dihadapi semasa melayari
internet.
Figure 1(a) Figure 1(a) Rajah 1(b) Rajah 1(b)
Based on Figure 1(a) and Figure 1(b), match the problems above according to the
correct security measures:
Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan
langkah keselamatan yang betul:(i) Figure 1(a) /Rajah 1(a)
..
(ii) Figure 1(b) / Rajah 1(b)
..
-
8/11/2019 Koleksi Soalan Negeri Bab_1
29/35
-
8/11/2019 Koleksi Soalan Negeri Bab_1
30/35
30
2. Figure 6 shows a security procedure done by Affendi.
Rajah 6 menunjukkan prosedur keselamatan yang dilaksanakan oleh Affendi
(
T
r
e
n
g
g
a
n
u
2
0
Figure 6 / Rajah
Based on Figure 6, / Berdasarkan Rajah 6,
(a) Name the security procedure.Namakan prosedur keselamatan tersebut. [1 mark]
(b) State the steps taken to apply this security procedure.
Nyatakan langkahlangkah yang diambil bagi menggunakan prosedur
keselamatan ini. [3 marks]
-
8/11/2019 Koleksi Soalan Negeri Bab_1
31/35
31
SECTION C
1. Figure 11 is an excerpt from an online newspaper.
Rajah 11 menunjukkan petikan daripada akhbar atas talian
(Kedah 2012)
Figure 11 / Rajah 11
Based on Figure 11: /Berdasarkan Rajah 11:
Describe the security measure that should be taken to protect government
website from the specified threat.
Huraikan langkah keselamatan yang perlu diambil untuk melindungi tapak web
kerajaan daripada ancaman yang dinyatakan.
[3 marks] [3 markah]
KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.
Deputy Information, Communications and Culture Minister Dato Joseph Salang
Gandum said this move followed the attacks on 198 websites, including government
portals, by the "Anonymous" hacker group last week.
"We have to set up stronger cyber security measures and ensure that government
websites are protected from such activities in the future."
(Straits Time; 21 June, 2011)
KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lama lagi
bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi dan
Kebudayaan Dato Joseph Salang Gandum mengatakan bahawa tindakan ini
berikutan daripada serangan ke atas 198 laman sesawang termasuk portal
kerajaan oleh kumpulan penggodam Anonymous minggu lepas.
Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh dan
memastikan laman-laman web kerajaan dilindungi pada masa akan datang.
(Straits Time; 21 Jun ,2011)
-
8/11/2019 Koleksi Soalan Negeri Bab_1
32/35
32
2. The following is a text on computer crime in television station broadcasting.
Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.
(N.Sembilan 2012)
Nora works as an editor in one of the larger private television broadcasting in
Malaysia. She uses her expertise in ICT for editing the television programs in order
to preserve the quality before they were broadcast by the television station.
Without companys permission Nora has made copies of the television
programs and sells it via Internet.
Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran
televisyen swasta yang terbesar di Malaysia. Nora menggunakan
kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga
mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman
rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa
pengetahuan majikannya.
Based on the text: /Berdasarkan teks itu:
Explain TWOways from the human aspect to prevent the above crime.
Terangkan DUAcara dari aspek kemanusiaan untuk mencegah jenayah di atas.
(4marks)(4markah)
3 . Statement 2 shows computer security risk.
Pernyataan 2 menunjukkan risiko keselamatan komputer.
(Pahang 2012)
Statement 2
Pernyataan 2
Amirul need to submit his multimedia presentation on tomorrow
morning. While working on his computer, he discover some of
files missing and some altered. He realize that someonehave
accessed his computer, who commit or responsible to wrong
doing.
Amirul perlu menghantar persembahan multimedia pada
keesokan hari. Semasa membuat kerja di komputer, dia
mendapati beberapa fail telah hilang. Dia menyedari
seseorangtelah mengakses ke komputernya, orang yang
bertanggungjawab membuat kesalahan.
-
8/11/2019 Koleksi Soalan Negeri Bab_1
33/35
33
Based on statement 2, / Berdasar kepada pernyataan 2,
Describe twoways, how people aspects can protect their computer in (a)?
Jelaskan duacara, bagaimana aspek manusia boleh melindungi komputer
mereka dalam (a)? [4 marks][4 markah]
-
8/11/2019 Koleksi Soalan Negeri Bab_1
34/35
-
8/11/2019 Koleksi Soalan Negeri Bab_1
35/35
35
Tarikh Topik / Sub topic Tanda
tangan
Guru
Catatan
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.1.2.4.2 Explain briefly the computer crimes
below: Fraud Copyright Infringement Theft
Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to
computer security: Malicious code Hacking
Natural disaster Theft
1.3 Computer Security
1.3.3 Security Measures
1.3.3.1 Select the appropriate security
measures to overcome the identified computer
threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography
Firewall Data backup Human aspects