27
CONFIDENTIAL 3765/1 ICT Nov 2009 2½ Hours PEJABAT PELAJARAN DAERAH KUALA LANGAT PEPERIKSAAN AKHIR TAHUN TINGKATAN 4 INFORMATION AND COMMUNICATION TECHNOLOGY 3765/1 2 ½ HOURS READ THE INSTRUCTION CAREFULLY 1. Section A consists of 25 questions. Answer ALL questions in answer sheet provided at the end of the question paper. 2. Section B consists of 5 questions. Answer ALL the questions. 3. Section C consists of 3 questions. Answer two questions. Question 31 is compulsory AND either Question 32 or Question 33. This paper consists of 22 printed pages. 3765/1 SULIT Name : …………………………………………… Class : ……………………..

Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

CONFIDENTIAL3765/1ICTNov 20092½ Hours

PEJABAT PELAJARAN DAERAH KUALA LANGAT

PEPERIKSAAN AKHIR TAHUN

TINGKATAN 4

INFORMATION AND COMMUNICATION TECHNOLOGY3765/1

2 ½ HOURS

READ THE INSTRUCTION CAREFULLY

1. Section A consists of 25 questions. Answer ALL questions in answer sheet provided at the end of the question paper.

2. Section B consists of 5 questions. Answer ALL the questions.3. Section C consists of 3 questions. Answer two questions. Question 31 is compulsory

AND either Question 32 or Question 33.

This paper consists of 22 printed pages.

CONFIDENTIAL

3765/1 SULIT

Name : …………………………………………… Class : ……………………..

Page 2: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

Section ABahagian A

[36 marks][36 markah]

Answer all questions. Write your answer in the spaces provided in Answer Sheet. Each answer carries one mark.Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah.

1. Communication is an act of transmitting____________________ Komunikasi adalah satu tindakan untuk menukarkan________________

A. data dataB. messages pesananC. knowledge pengetahuanD. information maklumat

2. Cyber law is defined as _____________________. Undang-undang cyber bermaksud ___________________.

A. any laws relating to electronic and technology industry. sebarang undang-undang yang berkait dengan industri elektronik dan teknologiB. any laws relating to industry and the Internet communications. sebarang undang-undang yang berkait dengan industri dan komunikasi internetC. any laws relating to technology and the Internet communications. sebarang undang-undang yang berkait dengan teknologi dan komunikasi internetD. any laws relating to protecting the internet and other online communication technology

sebarang undang-undang yang berkaitan dengan melindungi internet dan teknologi komunikasi dalam talian

3. Which of the following is NOT the example of computer fraud? Manakah antara berikut BUKAN contoh penipuan computer?

A. E-mail hoaxesE-mel palsu

B. Programmed FraudProgram Palsu

C. Investment Schemes by InternetSkim Pelaburan melalui Internet

D. Diverts goods to the wrong destinationsMenghantar barangan ke destinasi lain

3765/1 SULIT

Page 3: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

4. The most recent type of computer language would be …… Bahasa komputer yang terbaru adalah …..

A machine language bahasa mesinB assembly language

bahasa himpunanC third-generation language

bahasa generasi ketigaD natural language

bahasa tabii

5. What are the benefits of Electronic Banking to bank customers? Apakah kebaikan Electronic Banking kepada pengguna bank?

I 24-hour servicePerkhidmatan 24-jam

II Electronic Fund TransferPemindahan Dana Elektronik

III Electronic Cash DepositsDeposit Tunai Elektronik

IV Electronic Loan Application Permohonan Pinjaman Elektronik

A. I,II and IIIB. I,II and IVC. I,III and IVD. II, III and IV

6. Floppy disc, CD -ROM and flash drive are examples of ________________ Disket, CD-ROM dan pemacu kilat adalah contoh ______________

A Primary storageStoran primer

B Secondary storageStoran sekunder

C Tertiary StorageStoran ketiga

D Additional StorageStoran tambahan

7. Which of the following are output devices? Yang manakah di antara berikut adalah peranti output?

I. Printer pencetakII. Monitor monitorIII. Joystick kayu riaIV. Plotter pemplotV. Microphone mikrofon

A. I,II and IIIB. I,II and IVC. II,III and VD. III, IV and V

3765/1 SULIT

Page 4: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

8. Which of the following are biometric devices? Yang manakah di antara berikut merupakan peranti biometrik?

I. Hand geometryII. Callback SystemIII. Retinal ScanningIV. Signature Verification System

A. I, II and IIIB. I, II and IVC. I, III and IVD. II, III and IV

9. Windows XP, Macintosh OS X, and Linux are examples of Windows XP, Macintosh OS X, dan Linux adalah contoh-contoh bagi

A Application SoftwarePerisian Aplikasi

B Web BrowserPenggelintar Internet

C Operating SystemsSistem Pengoperasian

D Shareware programProgram Kongsi

10. Name the network topology in Figure 1 below. Namakan topologi rangkaian pada Rajah 1di bawah.

Figure 1Rajah 1

A. Star BintangB. Bus BasC. Ring CincinD. Mesh Campuran

3765/1 SULIT

Page 5: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

FIGURE 2RAJAH 2

11. Figure 2 shows a cable that is used as a physical transmission medium in transmitting electrical messages. The cable is a __________Rajah 2 menunjukkan kabel yang digunakan sebagai medium penghantaran fizikal dalam memindahkan mesej elektronik. Kabel itu adalah __________

A. Coaxial cableB. Fibre Optic Cable C. Shielded Twisted Pair D. Unshielded Twisted Pair

12. Device A in Figure 3 refer to Peranti A dalam Rajah 3 merujuk kepada

FIGURE 3RAJAH 3

A. switchB. modemC. access pointD. network interface card

3765/1 SULIT

Device A

Page 6: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

13. Table 1 shows the activities of computer crime. Jadual 1 menunjukkan aktiviti jenayah komputer

P Computer FraudKomputer

Q Copyright InfringementPencabulan Hakcipta

R Computer TheftKecurian Komputer

S Computer AttackSerangan Komputer

Table 1Jadual 1

Based on Table 1 write P, Q, R or S for the following statement:Berdasarkan Jadual 1 tuliskan P, Q, R atau S bagi pernyataan berikut:

i) Ahmad received multiple advertisement hoaxes in his email account.Ahmad menerima pelbagai iklan didalam akaun emailnya. : ___________S

ii) Abu transfer his company profit to his own account. : ___________RAbu memindahkan keuntungan syarikat ke dalam akaun peribadinya

iii) Ali downloaded an assignment from the internet and claimed it is his. : _______Q

Ali memuat turun tugasan dari internet dan mendakwa kepunyaanya.

14. Figure 5 shows some examples of application software: Rajah 5 menunjukkan sebahagian contoh perisian aplikasi

P Q R S T

Based on Figure 5, match the correct application software to its purpose: Berdasarkan Rajah 5, padankan perisian aplikasi yang bersesuaian

i) creating letters and memos : ___________ membuat surat dan memo

ii) managing financial accounts : ___________ mengurus akaun kewangan

iii) presenting ideas to an audience: _________ persembahan maklumat kepada penonton

3765/1 SULIT

Page 7: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

15. Choose your answers from the list below . Pilih jawapan dari senarai yang diberikan dibawah.

Fingerprint RecognitionPengecam CapJari

Voice recognitionPengecam Suara

Iris ScanningPengimbas Iris

Hand Geometry ScanningPengimbas Geomatri Tangan

Figure 4 shows different methods of authentication.Rajah 4 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.

Figure 4Rajah 4

Based on Figure 4, name the method used inBerdasarkan Rajah 4, namakan kaedah yang digunakan dalam

i)__________________________

ii) __________________________

3765/1 SULIT

i) ii)

Page 8: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

16. Figure 6 shows three types of cables which are used as physical transmission medium. Rajah 6 menunjukkan tiga jenis kabel yang digunakan sebagai media penghantaran fizikal.

R

S

T

FIGURE 6RAJAH 6

Based on Figure 6, write R, S or T for the following statements.Berdasarkan Rajah 6, tulis R, S atau T bagi pernyataan berikut.a) This cable have two insulated copper wires that are twisted around

each other. ___________

Kabel ini mempunyai dua wayar bersalut kuprum yang terpiuh antara satu sama lain.

b) This cable consists of a single copper wire surrounded by at least three layers ___________

Kabel ini mengandungi satu wayar kuprum tunggal yang dikelilingi oleh sekurang-kurangnya tiga lapisan.

17. Choose Figure R, S or T to match the following statements.Pilih Rajah R, S atau T untuk memadankan kenyataan berikut.

.

a. This network consists of a single central cable to which all computers and devices are connected. : _________________Rangkaian ini terdiri daripada satu kabel tunggal yang menghubungkan semua komputer dan peranti.

b. For this type of network, data travels from one computer to another computer in one direction. : _________________Bagi rangkaian jenis ini, data mengembara dari satu komputer ke komputer lain dalam satu arah.

3765/1 SULIT

R S T

Page 9: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

18. Below are the hardware needed while setting network facilities. Name them. Di bawah adalah perkakasan yang diperlukan untuk penyediaan rangkaian. Namakan perkakasan tersebut.

Hardwarei) ii) iii)

19. Fill in the blank with the correct answer. Isikan tempat kosong dengan jawapan yang betul.

i) Electromagnetic waves ranging in frequencies between 3 Kilo Hertz and 1 Giga Hertz are normally called ________________________ . radio waves

Gelombang elektromagnetik yang julat frekuensinya di antara 3 Kilo Hertz dan1 Giga Hertz selalunya dipanggil ________________________ ..

ii) Waves ranging in frequencies between 1 and 300 Giga Hertz are normally called ________________________. Microwaves

Gelombang yang julat frekuensinya di antara 1 dan 300 Giga Hertz selalunya dipanggil ________________________ ..

iii) Remote control devices that we use to control our television or radio at home use________________________ signals infrared Alat kawalan jauh yang digunakan untuk mengawal tv dan radio di rumah menggunakan isyarat________________________

Question 20 – Question 25Write True or False for the following statements :Tuliskan Benar atau Palsu pada pernyataan berikut:

20) Computer system consists of three major hardware components; input devices, output devices and processor.TrueSistem komputer terdiri daripada tiga komponen perkakasan yang utama iaitu peranti input, peranti output dan pemproses.

21) WAN is a network connecting computers within very large areas, such as state, countries and the world. False

WAN adalah rangkaian yang menghubungkan komputer di kawasan yang luas seperti di antara negeri, negara dan dunia.

21) Bus Topology are easy to add or remove any nodes. True Nod didalam Topologi bus adalah mudah untuk ditambah ataupun dibuang.

3765/1 SULIT

Page 10: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

22) A network links two or more computers together to enable data and resource exchange. True

Sebuah rangkaian menghubungkan dua atau lebih komputer untuk membolehkan pertukaran data dan sumber.

23Intranet does not have its own firewall to protect from intruders outside an organisation from accessing the company information or data. FalseIntranet tidak menggunakan tembok api sendiri untuk melindungi dari pencerobohan orang luar dari masuk dan mendapatkan maklumat atau data di dalam organisasi

a. All computers in peer-to-peer network have equal responsibilities and capabilities to use the resources available on the network.Semua komputer dalam rangkaian rakan-ke-rakan mempunyai tanggung jawab dan keupayaan yang sama untuk menggunakan sumber dalam rangkaian.True

b. Extranet is a private network that uses internet technology to share information with authorized parties.TrueEkstranet adalah rangkaian persendirian yang menggunakan teknologi Internet untuk berkongsi maklumat dengan pihak yang dibenarkan.

3765/1 SULIT

Page 11: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

Answer Sheet

NameIC No Form:

Question No. Candidate’s Answer Marks

1. 12. 23. 34. 45 56 67 78 89 910 1011 1112 1213 i ) 13

ii ) 14iii ) 15

14 i) 16ii) 17

15 i) 18ii) 19iii) 20

16 i) 21ii) 22

17 i ) 23ii ) 23

18 i) 25ii) 26iii) 27

19. i ) 28ii) 29iii ) 30

20 3121 3222 3323 3424 3525 36

TOTAL MARKS

3765/1 SULIT

Page 12: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

Section BBahagian B

[20 marks][20 markah]

This section consists of FIVE questions. You are required to answer all questions.Bahagian ini mengandungi LIMA soalan. Anda dikehendaki menjawab semua soalan tersebut.

1. a) Copyright infringement is defined as a violation of the rights secured by Copyright Act.

Pelanggaran hakcipta bermaksud pencabulan ke atas hak-hak yang dilindungi oleh Akta Hakcipta..

Give TWO examples of copyright infringement Berikan DUA contoh pelanggaran hakcipta

i. ___________________________________________ [2 marks]

ii. ___________________________________________ [2 markah]

b) Based on the pictures below, name TWO biometric devices used for authentication. [2 marks]

Berdasarkan rajah di bawah, namakan DUA peranti biometrik yang digunakan untuk tujuan pengesahan. [2 markah]

3765/1 SULIT

i. ______________________ ii. ______________________

Page 13: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

2. a. Define ‘computer theft’ and give an example of an activity that reflects computer theft. [2 marks]

Takrifkan ‘pencurian komputer’ dan beri satu contoh aktiviti yang \ menggambarkan pencurian komputer. [2Markah]

________________________________________________________________________

________________________________________________________________________

b. Hacking is a source of threat to security in computer. Define ‘hacking’ and give an example of hacking activity. [2 marks]Pencerobohan adalah satu sumber ancaman kepada keselamatan komputer. Takrifkan ‘pencerobohan’ dan beri satu contoh aktiviti pencerobohan.

[2Markah]

________________________________________________________________________

________________________________________________________________________

3. The diagram below show the network hardware requirement.Diagram dibawah menunjukkan perkakasan rangkaian.

1 X

2 Y

a) State X and Y [2marks] Nyatakan X dan Y [2 markah]

_______________________________________________________________

3765/1 SULIT

Page 14: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

b) Explain the function of X and Y [2marks] Terangkan fungsi X dan Y. [2 markah]

_________________________________________________________________

_________________________________________________________________

4. Figure 1 shows some of the components of a computer system. Rajah 1 menunjukkan sebahagian komponen sistem komputer

Based on Figure 1, Berdasarkan Rajah 1.

a) State two differences of user interfaces applied for both software H. [2 marks]Nyatakan DUA perbezaan antaramuka pengguna yang digunakan untuk

kedua-dua perisian H. [2 Markah]

_________________________________________________________________

_________________________________________________________________

b) Identify software I. Name one type of software I and its function. [2 marks]Kenalpasti perisian I. Namakan satu jenis perisian I dan nyatakan fungsinya. [2 Markah]

_________________________________________________________________

_________________________________________________________________

3765/1 SULIT

H I J

DOS WINDOWS ANTI VIRUS ANTI SPYWARE

SOFTWARE

Page 15: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

5. FIGURE 2 shows a network. Rajah 2 menunjukkan sebuah rangkaian.

Rajah 2

(a) Explain why PC1 and PC2 are not able to communicate with each other. [2 marks] Jelaskan kenapa PC1 dan PC2 tidak boleh berkomunikasi antara satu sama lain. [2 Markah]

_________________________________________________________________

_________________________________________________________________

(b) Redraw the table below and write the configuration of network connection for PC1 and PC2 so that both computers are able to communicate with each other.

[2 marks] Lukiskan semula jadual dibawah dan tulis konfigurasi rangkaian untuk PC1 dan PC2 supaya kedua-dua komputer dapat berkomunikasi. [2 Markah]

Computer IP address Subnet MaskPC1PC2

3765/1 SULIT

PC1IP address: 192.168.1.5Subnet mask: 255.255.253.0Gateway: 192.168.1.1

PC2IP address: 192.168.1.5Subnet mask: 255.255.253.0Gateway: 192.168.1.1

ADSL modemIP address: 192.168.1.1Subnet Mask: 255.255.255.0

FIGURE 2

INTERNET

Page 16: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

SECTION C[ 14 MARKS ]

This section consist of three questions. You are required to answer two questions only:

(i) Question 33 is compulsory, and(ii) Either Question 31 or Question 32

Question 31

Figure 1 shows the component of computer system

Figure 1

(a) Based on Figure 1, draw the information processing cycle in block diagram accordingly. [2 marks]

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

(b) Explain two functions of component A [2 marks]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

3765/1 SULIT

Page 17: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

(c) Differentiate between component B and component C [2 marks]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

(d) Give one example of component C other than shown in the figure 1 [1 mark]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

Question 32

Figure 2 shows computer network topologies.

Topology A Topology B Topology C

Figure 2

(a) Based on the Figure 2, give the name of:

i. Topology A : _____________________________________________

ii. Topology B : _____________________________________________

iii. Topology C : _____________________________________________

[3 marks]

3765/1 SULIT

Page 18: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

(b) Give two disadvantages of Topology B [2 marks]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

(c) Differentiate between Topology A and Topology C [2 marks]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

Question 33

Figure 3 shows three computers with system software and application software.

Figure 3

(a) Based on the figure 3, define the meaning of application software and give one example. [2 marks]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

3765/1 SULIT

MS DOSWord starDbaseAVG Antivirus

Windows XPMicrosoft ExcelNorton Antivirus

Windows 98Word 2000Microsoft AccessPc-cillin Antivirus

Computer X Computer Y Computer Z

Page 19: Type of technology - WordPress.com€¦  · Web viewManakah antara berikut BUKAN contoh penipuan computer? A. E-mail hoaxes. E-mel palsu . B. Programmed Fraud. Program Palsu. C

(b) State two (2) differences between system software and application software.

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________ [4 marks]

(c) Why Computer X needs to install the AVG Antivirus Software?

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________[1 mark]

3765/1 SULIT