web viewthis system also provides online services, phone banking system and credit cards. ... uses a...

31
SULIT 3765/1 PEPERIKSAAN PERTENGAHAN TAHUN MEI TAHUN 2014 FORM 4 TINGKATAN 4 Two Hour and Thirty Minutes Dua Jam Tiga Puluh Minit INFORMATION AND COMMUNICATION TECHNOLOGY PAPER 1 3765/1 JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU Do not open this question paper until you are told to do so 1) Kertas soalan ini mengandungi Bahagian A, Bahagian B dan Bahagian C. This question paper consist of Section A, Section B and Section C. 2) Bahagian A mengandungi 25 soalan dan Bahagian B mengandungi 5 soalan. Anda dikehendaki menjawab semua soalan di Bahagian A dan Bahagian B. Bahagian A hendaklah dijawab dalam HELAIAN JAWAPAN. Section A consists 25 question and Section B consists 5 question. You need to answer all question in Section A and Section B. Section A need to be answered in the ANSWER SHEET provided. 3) Bahagian C mengandungi 3 soalan. Anda dikehendaki menjawab Soalan 31 dan pilih satu lagi soalan sama ada soalan 32 atau 33. Section C consists of 3 questions. You need to answer question 31 and choose another from either question 32 or 33. SECTION NO. OF QUESTION MARKS SEC A /36 SEC B 26 27 28 29 30 31 1

Upload: doandat

Post on 31-Jan-2018

236 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

PEPERIKSAAN PERTENGAHAN TAHUN MEITAHUN 2014FORM 4TINGKATAN 4

Two Hour and Thirty MinutesDua Jam Tiga Puluh Minit

INFORMATION AND COMMUNICATION TECHNOLOGYPAPER 1

3765/1

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHUDo not open this question paper until you are told to do so

1) Kertas soalan ini mengandungi Bahagian A, Bahagian B dan Bahagian C.This question paper consist of Section A, Section B and Section C.

2) Bahagian A mengandungi 25 soalan dan Bahagian B mengandungi 5 soalan. Anda dikehendaki menjawab semua soalan di Bahagian A dan Bahagian B. Bahagian A hendaklah dijawab dalam HELAIAN JAWAPAN.Section A consists 25 question and Section B consists 5 question. You need to answer all question in Section A and Section B. Section A need to be answered in the ANSWER SHEET provided.

3) Bahagian C mengandungi 3 soalan. Anda dikehendaki menjawab Soalan 31 dan pilih satu lagi soalan sama ada soalan 32 atau 33.Section C consists of 3 questions. You need to answer question 31 and choose another from either question 32 or 33.

SECTION NO. OF QUESTION

MARKS

SEC A /36

SEC B

2627282930

SEC C313233

TOTAL

Kertas soalan ini mengandungi 24 halaman bercetak.

This question paper consists 24 printed pages.

1

Page 2: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

NO. KAD PENGENALAN

NAMA : ________________________________________________________

Question No.No. Soalan

Candidate’s AnswerJawapan Calon

MarkMarkah

1iii

2iii

345678910

11iii

12iii

13iii

1415

16iii

1718

19iii

20iii

2122

23iii

24iii

25iii

2

Page 3: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

Section A

Bahagian A

[36 marks]

[36 markah]

Answer all questions. Write your answers in the spaces provided in answer sheet. Each answer carries one mark.Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah.

1 Complete the following statement :

Lengkapkan pernyataan berikut :

Information and Communication Technology is the use of computers, (i) __________

devices and software applications for (ii) _____________, storing, retrieving,

protecting and transmitting information from anywhere and anytime.

Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti, (i)

_______________ dan perisian aplikasi untuk (ii) ________________, penyimpanan,

mendapatkan semula, melindungi dan menghantar maklumat dari mana-mana dan

pada bila-bila masa.

2 Figure 1 shows three technologies used in the generations of computers

Rajah I menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

P Q R

Figure 1

Rajah 1

Based on Figure 1, write P, Q or R to match the following:

3

Page 4: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

Berdasarkan Rajah l, tulis P, Q atau R untuk dipadankan dengan berikut:

(i) Second Generation / Generasi Kedua

(ii) Third Generation / Generasi Ketiga

3 In education, ICT usage can be divided into: .

Dalam bidang pendidikan, penggunaan ICT boleh dibahagikan kepada:

I. Teaching aids / Alat bantu mengajar

II Internet in education / Internet Dalam Pendidikan

III. Management aids / Alat membantu pengurusan

IV. Increase knowledge / Menambah pengetahuan

A. I , II and III

I , II dan III

B. I, II and IV

I, II dan IV

C. I, III and IV

I, III dan IV

D. All the above

Semua di atas

4

Statement above refers to a system use in banking field. The system is regarding to

________________ system.

Pernyataan di atas merujuk kepada sebuah sistem yang digunakan di sektor

perbankan. Sistem ini merujuk kepada sistem ______________________

5 Which of the following statements is related to the negative impact of ICT on the

4

All transaction are done by computers and can be done at anytime and place. This

system also provides online services, phone banking system and credit cards.

Semua transaksi dilakukan oleh komputer dan boleh dilakukan pada bila-bila masa

dan di mana sahaja. Selain itu, sistem ini menawarkan perkhidmatan atas talian,

sistem perbankan telefon dan kredit card.

Page 5: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

society?

Manakah antara berikut berkait rapat dengan kesan negatif ICT ke atas masyarakat?

I. Information travels borderless through the Internet.

Maklumat perjalanan tanpa batas melalui internet.

II. People can receive information faster by using ICT technology.

Orang boleh menerima maklumat lebih cepat dengan menggunakan teknologi

ICT.

III. Using computers frequently and for long hours is harmful to health.

Menggunakan komputer dengan kerap dan selama berjam-jam berbahaya

bagi kesihatan.

IV. Today younger generation prefers to sit in front of computers than socialise

with others.

Hari ini generasi muda lebih memilih untuk duduk di depan komputer

daripada bersosial dengan orang lain.

A. I and III

I dan III

B. III and IV

III dan IV

C. II, III and IV

II, III dan IV

D. All the above

Semua di atas

6 Razif spreads a rumor that a police chief is receiving bribes. Razif’s conduct is called

Razif menyebarkan khabar angin bahawa seorang Ketua Polis menerima rasuah.

Perbuatan Razif dikenali sebagai

A Hijacker

Perampas

B Slander

Fitnah

C Cracker

5

Page 6: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

Memecah kata laluan

D Hacker

Penggodam

7 _____________________ is a moral philosophy where a person makes a specific

moral choice and sticks to it.

_____________________ ialah falsafah moral di mana seseorang itu membuat

pilihan moral yang spesifik dan berpegang teguh padanya.

8 State whether the following statement is True or False.

Nyatakan sama ada pernyataan berikut Benar atau Palsu.

Intellectual Property Law refer to any laws relating to protecting the internet and other

online comunication technologies.

Undang-undang Harta Intelek merujuk kepada undang-undang yang melindungi

internet dan teknologi komunikasi atas talian yang lain.

9 The following is a statement on information privacy.

Pernyataan berikut berkaitan keperibadian maklumat

State the way to protect privacy based on the statement,

Nyatakan kaedah melindungi kerahsiaan berdasarkan pernyataan di atas.

6

A piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.Perkakasan atau perisian yang berfungsi dalam rangkaian komputer bertujuan menghalang sesetengah komunikasi yang telah disekat/ dihalang oleh polisi keselamatan.

Page 7: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

Effect of X cause family relationships to be severed, the relationship became

distant friends and people looking statements negative despite the uncertain

truth. Effects of Y would lead to abuse of women and children and cause

social problems such as adultery and teenage baby dumping.

Kesan X menyebabkan hubungan kekeluargaan menjadi putus, hubungan

rakan-rakan menjadi renggang dan masyarakat berpandangan negetif biarpun

penyataan itu belum pasti benarnya. Kesan Y pula menyebabkan

penganiayaan wanita dan kanak-kanak dan menyebabkan berlakunya masalah

sosial remaja seperti penzinaan dan pembuangan bayi.

SULIT 3765/1

10

State the verification method for validating process above.

Nyatakan kaedah verifikasi bagi proses pengesahan di atas.

A. Biometric devices

Peranti biometrik

B. Callback system

Sistem panggilan semula

C. User identification

Pengenalan pengguna

D. Processed object

Objek yang dimiliki

11

The above statement is the effects of the problems facing society today. State, these

effects:

Penyataan diatas adalah kesan-kesan yang dihadapi oleh masyarakat hari ini.

Nyatakan, kesan-kesan tersebut:

7

Page 8: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

(i) Effect of X / Kesan X

(ii) Effect of Y / Kesan Y

12 Table 1 shows how to control access to controversial contents.Jadual 1 menunjukkan bagaimana untuk mengawal kandungan kontroversi.

Match the statements with the given answers.Padankan pernyataan dengan jawapan yang diberi.

13 Table 2 shows the activities of computer crime.

Jadual 2 menunjukkan aktiviti jenayah komputer

P Computer Attack / Serangan Komputer

Q Computer Theft / Kecurian Komputer

RCopyright Infringement / Pencabulan

Hakcipta

S Computer Fraud / Penipuan Komputer

Table 2

Jadual 2

Based on Table 2, write P, Q, R or S for the following statement:

Berdasarkan Jadual 2, tuliskan P, Q, R atau S bagi pernyataan berikut:

8

Keyword blockingMenyekat perkataan

A

Web RatingPelayar hanya menerima web yang telah ditentukan

B

i.

Uses a list of banned word or objects terms such as xxx, sex, porn and nude.Menyekat laman web dengan kata kunci tertentu sepert xxx, sex, porn and nude.

ii.

Use software to list the websites that will be blocked by using software.Menyenaraikan nama-nama laman web untuk disekat dari memasukinya dengan menggunakan software.

Site BlockingMenyekat laman web

C

Table 1 / Jadual 1

Page 9: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

i. Ahmad running an investment schemes through his blog.

Ahmad menjalankan urus niaga skim cepat kaya di laman blognya.

ii. Salim take the school computer mouse without his teacher permission.

Salim mengambil tetikus komputer sekolah tanpa kebenaran gurunya.

14 Computer security is defined as

Keselamatan komputer didefinisikan sebagai

A. Security measures used to protect the network system

Langkah-langkah keselamatan yang digunakan untuk melindungi sistem

rangkaian.

B. Any criminal activity that is related to the use of computers.

Apa sahaja aktiviti jenayah yang melibatkan penggunaan komputer.

C. Protecting our computer systems and the information they contain against

unwanted access, damage, destruction or modification.

Melindungi sistem komputer dan maklumat yang dimiliki terhadap capaian

yang tidak sah, kerosakan, kemusnahan atau pengubahsuaian.

D. Storing data, program and other important documents in a place that will not

affected by any major destruction.

Menyimpan data, program dan dokumen-dokumen penting di suatu tempat

yang selamat daripada kemusnahan besar.

15 Which of the following define theft?

Manakah yang berikut menerangkan maksud kecurian ?

i. It is defined as unauthorised access to the computer system by a hacker.

Capaian tanpa kebenaran/ pencerobohan ke atas sistem computer.

ii. Computer is used to steal money, goods, information and resources.

Komputer digunakan untuk mencuri wang, barang, maklumat dan sumber.

iii. Someone who seeks and exploits weaknesses in a computer system or

computer network.

Seseorang yang mencari dan mengeksploitasi kelemahan di dalam system

computer atau system rangkaian.

9

Page 10: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

iv. Stealing of computer, especially notebook and PDAs.

Mencuri computer, terutama komputer riba dan PDA.

A. i, ii, iii B. ii dan iii

C. ii dan iv D. i dan iv

16 Table 3 shows two situations of computer threats

Jadual 3 menunjukkan dua situasi ancaman computer.

Situation A

Situasi A

The damage of the computer system because of flood,

fire, earthquakes, storms nd tornados, excessive heat and

inadequate power supply.

Kerosakan ke atas sistem komputer disebabkan oleh

bencana alam seperti banjir, kebakaran, gempa bumi,

kilat, putting beliung, kepanasan melampau dan bekalan

kuasa tidak mencukupi

Situation B

Situasi B

It is a threat to computing assets by causing undesired

effects in the programmer’s part. The effect is cause by an

agent, with the intention to cause damage.

Kod aturcara yang menyebabkan kesan yang tidak

diingini. Biasanya bertujuan untuk mendatangkan

kerosakan kepada computer.

Table 3

Jadual 3

Based on Table 3 above, state the appropriate security measures to overcome the

Berdasarkan Jadual 3 di atas, nyatakan langkah keselamatan bagi mengatasi masalah

(i) Situation A

Situasi A

(ii) Situation B

Situasi B

17 Here is a computer security procedure

Berikut adalah prosedur keselamatan komputer

10

Page 11: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

A. Hacking

Penggodaman

B. Computer theft

Kecurian komputer

C. Worm

Cecacing

D. Cryptographic

Kriptografi

18 The computer system is the device which receives input and processed data to be the

information and displayed on the ________________ device and can be stored in

storage for use in the future.

Sistem komputer merupakan proses dimana peranti input menerima dan memproses

data menjadi maklumat dan di papar oleh peranti ________________ dan juga boleh

di simpan dalam storan untuk kegunaan masa akan datang.

19 State whether the following statement is True or False

Nyatakan samada pernyataan berikut Benar atau Palsu

i. Input is any data and instructions entered into the memory of a

computer.

Input adalah memasukkan data dan arahan ke dalam sistem ingatan computer.

ii. Output is a location in which data, instructions, and information are saved for

future use.

Output adalah tempat dimana data, arahan dan informasi disimpan untuk

digunakan semula.

20

11

INPUT P OUTPUT

Q

Page 12: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

State TWO types of Q.

Nyatakan DUA jenis bagi Q.

21 Which is the following statement not true about ASCII code

Manakah kenyataan di bawah tidak benar berkaitan ASCII kod.

A. ASCII is standard of 7-bit code used to represent characters, which include

letters, numbers & punctuation marks.

ASCII adalah standard kod 7-bit digunakan untuk mewakili aksara, termasuk

perkataan, nombor & tanda baca.

B. ASCII enables manufacturers to produce component that are assured to

operate correctly in a computer.

ASCII membolehkan pengeluar untuk menghasilkan komponen yang dijamin

untuk beroperasi dengan betul dalam komputer.

C. ASCII was established to achieve compatibility between various types of data

processing equipment making it possible for the components to communicate

with each other successfully.

ASCII telah ditubuhkan untuk mencapai keserasian antara pelbagai jenis

peralatan pemprosesan data dan membolehkan komponen untuk

berkomunikasi antara satu sama lain dengan jayanya.

D. ASCII is the process of implementing the instructions in a program

ASCII adalah proses melaksanakan manual program

22 State the measurements indicate for following data:

Nyatakan pengukuran data berikut:

1000 byte/bait 1 Kilobyte/Kilobait

1000 Kilobyte/Kilobait 1 Megabyte/Megabait

1000 Megabyte/Megabait 1 …………………

12

Page 13: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

23 Figure 2 shows four computer devices

Rajah 2 menunjukkan 4 peranti komputer

Figure 2

Rajah 2

Based on Figure 2, write A, B, C, or D to match with the following statements.

Berdasarkan Rajah 2, tulis A, B, C, atau D untuk dipadankan dengan pernyataan

berikut.

(i) A device that uses a light source to read characters marks and codes and then

converts them into digital data that a computer can process.

Peranti yang menggunakan sumber cahaya untuk membaca aksara, tanda

dan kod, kemudian menukarkannya ke bentuk data digital yang boleh

diproses oleh komputer.

(ii) A device that input the speech, music and sound effects entered into the

computer.

Peranti yang memasukkan ucapan, muzik dan kesan bunyi ke dalam komputer

13

A B C D

Page 14: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

24

Figure 3

Rajah 3

Based on Figure 3, specify the location number of the following components according

to function.

Merujuk kepada Rajah 3, nyatakan nombor lokasi komponen berikut mengikut

fungsinya.

BilFunction of component /

Fungsi kompenen

Component place /

kedudukan Komponen

i) - Primary Memory of computer / Memori

utama computer

- Keeping data and programs that can be

accessed by the processor / Menyimpan

data dan program yang boleh di akses

oleh prosessor

- Volatile / meruap

ii) - Has two components: control unit (CU)

and the Arithmetic logic unit (ALU) /

Mempunyai 2 komponen iaitu control

unit (CU) dan Arithmetic logic unit

(ALU)

- Translated by software command /

Memterjemahkan arahan oleh perisian

14

Page 15: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

25 State whether the following statement is True or False.

Nyatakan sama ada pernyataan berikut Benar atau Palsu

(i) Data from ROM can be read or retrieved and written or stored during

processing whereas data from RAM can just be read only.

Data daripada ROM boleh dibaca atau disimpan semasa proses berlaku,

manakala data daripada RAM hanya boleh dibaca sahaja.

(ii) CD, CD-ROM and DVD are read only storage. It used for distribution of

digital information such as music, video and computer programs.

CD, CD-ROM dan DVD adalah ingatan baca sahaja. Ia digunakan untuk

mengagih maklumat digital seperti muzik, video dan program computer.

15

Page 16: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

Fingerprint Recognition Iris Scanning

SULIT 3765/1

Section BBahagian B

[20 marks]

[20 markah]

Answer all the questions.Jawab semua soalan.

26. The following is a statement on information privacy.

Berikut adalah penyataan tentang kebersendirian maklumat.

a. Based on the statement, list TWO ways to protect privacy.

Berdasarkan pernyataan itu, senaraikan DUA cara untuk melindungi

kerahsiaan.

[ 2 marks]

[ 2 markah]

b.

Figure 4

Rajah 4

Figure 4 shows the examples of biometric device.

Rajah 4 menunjukkan contoh-contoh peranti biometrik.

16

“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”“Kebersendirian maklumat merujuk kepada hak individu dan hak organisasi menolak atau menghadkan pengumpulan dan penggunaan maklumat yang berkaitan dengannya”

Shelly, 2006

Page 17: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

i) List another ONE example of biometric devices that you have learnt.

Senaraikan SATU lagi contoh peranti biometrik yang telah anda pelajari.

[1 mark]

[ 1 markah]

ii) State the need of authentication. [1 mark]

Nyatakan keperluan pengesahan ketulenan. [ 1 markah]

27. Maisarah always spends her leisure time surfing Internet. She usually downloads

movies and MP3 songs and sells them to her friends. She uses his ICT knowledge to

get an unauthorized serial number for the software. One day, she finds that her

computer is getting slow and keeps in duplicating files.

Maisarah selalu meluangkan masa lapangnya melayari Internet. Dia sering memuat

turun filem dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. Maisarah

menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor-nombor

siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu

hari, Maisarah mendapati komputernya menjadi perlahan dan sering membuat

salinan fail tertentu secara berulang.

a. Identify the computer crime that Maisarah has committed and justify how she can

prevent her computer from the the problem.

Kenalpasti jenis jenayah komputer yang dilakukan oleh Maisarah dan terangkan

bagaimana dia boleh mengatasi masalah yang berlaku terhadap komputernya.

[3 marks]

[3 markah]

b. Gives one example of the other type of computer crimes.

Berikan satu contoh jenayah computer.

[1 mark]

[1markah]

17

Page 18: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

28 Statement below shows the terms of security threats.

Pernyataan di bawah menunjukkan istilah ancaman keselamatan.

Mr. Faiz has made copies of all company data to be stored in a safe place to

avoid flooding.

En. Faiz telah membuat salinan terhadap semua data syarikatnya untuk

disimpan di tempat yang selamat bagi mengelakkan dari banjir.

a) Identify and explain briefly the threats to computer security based on statement

above. [3marks]

Kenalpasti dan terangkan secara ringkas ancaman keselamatan berdasarkan

pernyataan di atas. [3markah]

b) State ONE computer threat other than your given answer on (a). [1 marks]

Nyatakan SATU ancaman keselamatan selain daripada jawapan di (a).

[1 markah]

29. Figure 5 shows an information processing cycle.

Rajah 5 menunjukkan satu kitaran proses maklumat.

Figure 5

Rajah 5

Based on the figure above,

Berdasarkan rajah di atas,

18

Q

OUTPUTPINPUT

Page 19: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

a) State P and Q.

Nyatakan P dan Q.

[ 2 marks ]

[ 2 markah ]

b) Give two differences between primary storage and secondary storage.

Berikan dua perbezaan di antara storan primer dan storan sekunder.

[ 2 marks ]

[ 2 markah ]

30. Figure 6 shows three examples of secondary storage.

Rajah 6 menunjukkan tiga contoh storan sekunder.

A B C

Figure 6

Rajah 6

a) Based on Figure 6, state the types of secondary storage;

Berdasarkan Rajah 6, nyatakan jenis storan sekunder;

i) A :

ii) B :

b) Differentiate between secondary storage B and C.

Bezakan antara storan sekunder B dan C.

19

[2 marks][2 markah]

[2 marks][2 markah]

Page 20: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

SECTION C ( 14 Marks )

Bahagian C ( 14 Markah )

This section consists of 3 questions. Answer 2 questions.

Question 31 is compulsory.

Choose either question 32 or 33.

Bahagian ini mengandungi 3 soalan. Jawab 2 soalan.

Soalan 31 wajib dijawab.

Pilih samada soalan 32 atau 33.

31 Figure 7 shows a security procedure done by Murni.

Rajah 7 menunjukkan prosedur keselamatan yang dilaksanakan oleh Murni.

Figure 7

Rajah 7

Based on Figure 7,

Berdasarkan Rajah 7,

20

Page 21: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

a) (i) Name the security procedure. [1 mark]

Namakan prosedur keselamatan tersebut. [1 markah]

(ii) Explain the steps taken to apply this security procedure. [2 marks]

Terangkan langkah –langkah yang diambil bagi menggunakan

prosedurc keselamatan ini. [2 markah]

b) Explain TWO the other threats to security procedure based your answer in (a-i).

[4 marks]

Terangkan DUA prosedur keselamatan selain daripada jawapan di (a-i).

[4 markah]

21

Page 22: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

32. Figure 8 shows a situation in education system in Malaysia.

Rajah 8 menunjukkan satu situasi dalam sistem pendidikan di Malaysia.

System A System B

Sistem A Sistem B

Figure 8

Rajah 8

Based on Figure 8,

Berdasarkan Rajah 8,

(a) State two differences between System A and System B.

Nyatakan dua perbezaan antara Sistem A dan Sistem B.

[ 4 marks ]

[4 markah]

(b) Explain briefly three positive impact when the system changed from the system

from A to B.

Jelaskan secara ringkas tiga kesan positif apabila sistem bertukar dari sistem A

ke sistem B.

[ 3 marks ]

[ 3 markah ]

22

Page 23: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

33. Figure 9(a), Figure 9(b) and Figure 9(c) show parts of component on a mother

board.

Rajah 9(a) , Rajah 9(b) dan Rajah 9(c) menunjukkan sebahagian komponen

yang terdapat pada sebuah papan induk.

Figure 9(a)

Rajah 9(a)

Figure 9(b) Figure 9(c)

Rajah 9(b) Rajah 9(c)

23

P

R

Page 24: Web viewThis system also provides online services, phone banking system and credit cards. ... Uses a list of banned word or objects terms such as xxx, sex, porn and nude

SULIT 3765/1

Based on Figure 9(a), Figure 9(b) and Figure 9(c);

Berdasarkan Rajah 9(a), Rajah 9(b) dan Rajah 9(c);

a) Label component:

Labelkan komponen

i) P

ii) R

b) State the name of component on the motherboard to put the component in

Figure 9(b)

Nyatakan nama komponen pada papan induk untuk meletakkan komponen

seperti di Rajah 9(b).

c) Give two differences between the component in Figure 9(b) and Figure 9(c).

Berikan dua perbezaan di antara komponen pada Rajah 9(b) dan Rajah 9 (c).

END OF THE QUESTIONSSOALAN TAMAT

24

[2 marks][2 markah]

[1 mark][1 markah]

[4 marks][4 markah]