scheme fullset pat 2010

9
Nama : …………………………… No. Kad Pengenalan : ………………… Tingkatan : 4 Answer Sheet / Helaian Jawapan Section A / Bahagian A Question No. No. Soalan Candidate's Answer Jawapan Calon Marks Markah 1 B 1 2 D 2 3 (i) Fingerprint Recognition 3 (ii) Iris Recognition / hand Geometry / Retinal Recognition/facial recognition/voice recognition/signature verification system 4 4 C 5 (i) D (Computer Theft ) 5 (ii) A (Computer Crime) 6 (iii) C (Computer Attack) 7 6 B 9 7 C 10 8 (i) False 11 (ii) True 12 (iii) False 13 9 B 14 10 B 15 11 (i) Control Unit 16 (ii) Arithemetic Logic Unit 17 12 RAM 18 13 A 19 14 C 20 15 B 21 16 B 22 17 C 23 18 C 24 19 A 25 20 A 26 21 (i) Q 27 (ii) S 28 22 (i) R 29 (ii) S 30 23 (i) R 31 (ii) T 32 24 (i) RJ45 Connector 33 (ii) Cable Stripper 34 25 (i) Radio Waves 35 (ii) Infrared 36 3765/1

Upload: afyudin

Post on 26-Oct-2015

8 views

Category:

Documents


0 download

DESCRIPTION

Scheme Fullset Pat 2010

TRANSCRIPT

Page 1: Scheme Fullset Pat 2010

Nama : …………………………… No. Kad Pengenalan : …………………Tingkatan : 4

Answer Sheet / Helaian Jawapan

Section A / Bahagian A

Question No.No. Soalan

Candidate's AnswerJawapan Calon

MarksMarkah

1 B 12 D 2

3 (i) Fingerprint Recognition 3(ii) Iris Recognition / hand Geometry / Retinal Recognition/facial

recognition/voice recognition/signature verification system4

4 C5 (i) D (Computer Theft ) 5

(ii) A (Computer Crime) 6(iii) C (Computer Attack) 7

6 B 97 C 10

8 (i) False 11(ii) True 12(iii) False 13

9 B 1410 B 15

11 (i) Control Unit 16(ii) Arithemetic Logic Unit 17

12 RAM 1813 A 1914 C 2015 B 2116 B 2217 C 2318 C 2419 A 2520 A 26

21 (i) Q 27(ii) S 28

22 (i) R 29(ii) S 30

23 (i) R 31(ii) T 32

24 (i) RJ45 Connector 33(ii) Cable Stripper 34

25 (i) Radio Waves 35(ii) Infrared 36

3765/1

Page 2: Scheme Fullset Pat 2010

SECTION B

26. a) Two main sectors that used ICT in their management.

Education

Banking

Industry

e-commerce

b) two (2) differences between worms and viruses

Worm Virus

Operate through the network Spread trough any medium

Spread copies of itself as a stand

alone program

Spread copies of itself as a program

that attaches to other program

27. a) Computer Fraud

Computer fraud is defined as having an intention to take advantage over or causing

loss to other people, mainly on monetary basis through the use of computers.

b) Infringement

Copyright Infringement is defined as a violation of the rights secured by a copyright.

28. a) Complete the machine cycle of Central Processing Unit (CPU) below.

b) We transmit information or data by using 2 types of signals namely digital and

analog.

29. a) Function of system software

Enables the computer to function properly

Control or maintains the operations of computer and its devices

Serves as the interface between the user, the application software and the

computer’s hardware.

3765/1 2

Fetching

Decoding

Executing

Storing

Page 3: Scheme Fullset Pat 2010

b) Differences between Random Access Memory (RAM) and Read Only Memory

(ROM).

RAM ROM

Data and Program

Stores during and after processing

Stored by manufacturer

Content Store information temporarily Stores instructions (information) permanently

Processing Time

Very fast but uses a lot of power Fast but uses very little power

Volatility Volatile Non-volatile

30. a) Define ‘Client’ and ‘Server’ in a client/server network.

A client is a computer which requests services or files from server computerA server is a computer that shares information and resources with other computers on a network.

b) Explain what a peer-to-peer network is.

Peer to peer or P2P network is a network with all the nodes acting as both server and clients. A PC can access files located on other PC and can also provide files to other PCs. All computers in the peer to peer network has equal responsibilities and capabilities to use the resources available on the network.

3765/1 3

Page 4: Scheme Fullset Pat 2010

QUESTION 31a) Based on Figure 1, draw the information processing cycle in block diagram

accordingly.

b) Explain two functions of component X.

i. Interprets and carries out basic instructions that operate a computer

ii. Control unit directs and coordinates operations in computeriii. Arithmetic logic unit (ALU) performs arithmetic, comparison, and

logical operations

c) Differentiate between component Y and component Z

Y(primary storage) Z(secondary storage)Accessible directly by the processing unit (CPU) – CPU can access the data or instructions directly

Not accessible directly by the CPU – need to be copied to memory (primary storage) before the CPU can access the data or instructions

Access time – faster, measured in nanoseconds (billionths of a second)

Access time – slower, measured in miliseconds (thousandths of a second)

More expensive and smaller capacity Less expensive and bigger capacityStores data from input device or ftom secondary storage device e.g. floppy disk for immediate acess

Stores data from input device or from other secondary storage devices permanently but must be copied to memory first

Stores data and instructions temporarily, disappears when power to computer is switched offVolatile memory – content (data and instructions lost on failure of power supply or when the computer is switched off

Nonvolatile – content retained and not lost even when power is removed

Can be read and written directly by the CPU – data and instructions can be read and written by the CPU

Can be read and written but not directly by the CPU – data and instructions have to be copied to memory before they can be read and written by the CPU

Holds instructions to be executed and data to be used with those instructions

Holds instrunctions and data which have to be copied to memory (primary storage) before instructions can be executed and data can be used by the CPU

Holds instrunctions and data while they are being processed by the CPUStores instructions to execute a programme to allow the CPU to follow instantly the set

3765/1 4

Input Process Output

Storage

Page 5: Scheme Fullset Pat 2010

of instructions

d) Mr. Hamdan had installed a few application software on Computer A.

Differentiate between word processing software and spreadsheet software.

Word Processing Software Spreadsheet SoftwareUsed to create, edit and format textual documents such as letters, memos, reports, fax cover sheets, mailing labels, and newsletters

Used to create, edit and format worksheets

Allow user to create, edit, format, print, and save documents

Allow users to organize data in rows and columns

Features include AutoCorrect AutoFormat Columns Grammar Checker Tables Templates Thesaurus Tracking Changes/Comments Voice Recognition Web Page Development

Feature include Function Recalculation Charting

QUESTION 32(a) Explain Mr. M’s activity in Figure 11(a).

Mr. M’s using his computer network skill illegally accessing the server at College ABC. Mr. M’s access the server data without permission. That mean Mr. M hacks the computer server at College ABC. Mr. M also changes the data in the examination database in the server. By using his skill he is paid by other students.

(b) Explain how the activity in Figure 11(a) will affect the college

Hacker changes the examination marks. The examination database is not valid anymore. So false data will be distributed and the organization will be unstable. The organizer will try to find where the problem is and this will increase the cost of maintenance.

(c) Give two other possible threats to the computer security of the college.

i. Natural disaster such as flood, storm and etc.

ii. Malicious code such as virus and worm.

iii. Theft(d) State one possible measure that can be carried out by the network

administrators in Figure 11(b).

Install firewall

3765/1 5

Page 6: Scheme Fullset Pat 2010

QUESTION 33

(a) Give the definition of the environment in statement 2 situation.

Information can be stored and retrieved through the digital medium instead of paper .Example online communication via email, online chat ,MayBank2U and any other relevant example.

(b) State two other positive and two other negative impacts of ICT usage.

Positive/Positif Faster Communication Speed

In the past, it took a long time for any news or messages to be send. Now with the Internet, news or messages are sent via e-mail to friends, business partners or to anyone efficiently. With the capability of bandwidth, broadband and connection speed on the Internet, any information can travel fast and at an instant. It saves time and is inexpensive.

Lower Communication CostUsing the Internet is cost-effective than the other modes of communication such as telephone, mailing or courier service. It allows people to have access to large amounts of data at a very low cost. With the Internet we do not have to pay for any basic services provided by the Internet. Furthermore, the cost of connection to the Internet is relatively cheap.

Reliable Mode Of CommunicationComputers are reliable. With the internet, information could be accessed and retrieved from anywhere and at anytime. This makes it a reliable mode of communication. However, the input to the computer is contributed by humans. If the data passed to the computer is faulty, the result will be faulty as well. This is related to the term GIGO.GIGO is a short form for Garbage In Garbage Out. It refers to the quality of output produced according to the input. Normally bad input produces bad output.

Effective Sharing Of InformationWith the advancement of ICT, information can be shared by people all around the world. People can share and exchange opinions, news and information through discussion groups, mailing list and forums on the Internet. This enable knowledge sharing which will contribute to the development of knowledge based society.

Negative Bad posture Eyestrain

3765/1 6

Page 7: Scheme Fullset Pat 2010

Physical and mental stress

* any relevant explaination for each answers is acceptable. Sebarang huraian bagi setiap jawapan yang boleh diterima.

3765/1 7