Upload
others
View
9
Download
0
Embed Size (px)
Citation preview
CONFIDENTIAL3765/1ICTNov 20092½ Hours
PEJABAT PELAJARAN DAERAH KUALA LANGAT
PEPERIKSAAN AKHIR TAHUN
TINGKATAN 4
INFORMATION AND COMMUNICATION TECHNOLOGY3765/1
2 ½ HOURS
READ THE INSTRUCTION CAREFULLY
1. Section A consists of 25 questions. Answer ALL questions in answer sheet provided at the end of the question paper.
2. Section B consists of 5 questions. Answer ALL the questions.3. Section C consists of 3 questions. Answer two questions. Question 31 is compulsory
AND either Question 32 or Question 33.
This paper consists of 22 printed pages.
CONFIDENTIAL
3765/1 SULIT
Name : …………………………………………… Class : ……………………..
Section ABahagian A
[36 marks][36 markah]
Answer all questions. Write your answer in the spaces provided in Answer Sheet. Each answer carries one mark.Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah.
1. Communication is an act of transmitting____________________ Komunikasi adalah satu tindakan untuk menukarkan________________
A. data dataB. messages pesananC. knowledge pengetahuanD. information maklumat
2. Cyber law is defined as _____________________. Undang-undang cyber bermaksud ___________________.
A. any laws relating to electronic and technology industry. sebarang undang-undang yang berkait dengan industri elektronik dan teknologiB. any laws relating to industry and the Internet communications. sebarang undang-undang yang berkait dengan industri dan komunikasi internetC. any laws relating to technology and the Internet communications. sebarang undang-undang yang berkait dengan teknologi dan komunikasi internetD. any laws relating to protecting the internet and other online communication technology
sebarang undang-undang yang berkaitan dengan melindungi internet dan teknologi komunikasi dalam talian
3. Which of the following is NOT the example of computer fraud? Manakah antara berikut BUKAN contoh penipuan computer?
A. E-mail hoaxesE-mel palsu
B. Programmed FraudProgram Palsu
C. Investment Schemes by InternetSkim Pelaburan melalui Internet
D. Diverts goods to the wrong destinationsMenghantar barangan ke destinasi lain
3765/1 SULIT
4. The most recent type of computer language would be …… Bahasa komputer yang terbaru adalah …..
A machine language bahasa mesinB assembly language
bahasa himpunanC third-generation language
bahasa generasi ketigaD natural language
bahasa tabii
5. What are the benefits of Electronic Banking to bank customers? Apakah kebaikan Electronic Banking kepada pengguna bank?
I 24-hour servicePerkhidmatan 24-jam
II Electronic Fund TransferPemindahan Dana Elektronik
III Electronic Cash DepositsDeposit Tunai Elektronik
IV Electronic Loan Application Permohonan Pinjaman Elektronik
A. I,II and IIIB. I,II and IVC. I,III and IVD. II, III and IV
6. Floppy disc, CD -ROM and flash drive are examples of ________________ Disket, CD-ROM dan pemacu kilat adalah contoh ______________
A Primary storageStoran primer
B Secondary storageStoran sekunder
C Tertiary StorageStoran ketiga
D Additional StorageStoran tambahan
7. Which of the following are output devices? Yang manakah di antara berikut adalah peranti output?
I. Printer pencetakII. Monitor monitorIII. Joystick kayu riaIV. Plotter pemplotV. Microphone mikrofon
A. I,II and IIIB. I,II and IVC. II,III and VD. III, IV and V
3765/1 SULIT
8. Which of the following are biometric devices? Yang manakah di antara berikut merupakan peranti biometrik?
I. Hand geometryII. Callback SystemIII. Retinal ScanningIV. Signature Verification System
A. I, II and IIIB. I, II and IVC. I, III and IVD. II, III and IV
9. Windows XP, Macintosh OS X, and Linux are examples of Windows XP, Macintosh OS X, dan Linux adalah contoh-contoh bagi
A Application SoftwarePerisian Aplikasi
B Web BrowserPenggelintar Internet
C Operating SystemsSistem Pengoperasian
D Shareware programProgram Kongsi
10. Name the network topology in Figure 1 below. Namakan topologi rangkaian pada Rajah 1di bawah.
Figure 1Rajah 1
A. Star BintangB. Bus BasC. Ring CincinD. Mesh Campuran
3765/1 SULIT
FIGURE 2RAJAH 2
11. Figure 2 shows a cable that is used as a physical transmission medium in transmitting electrical messages. The cable is a __________Rajah 2 menunjukkan kabel yang digunakan sebagai medium penghantaran fizikal dalam memindahkan mesej elektronik. Kabel itu adalah __________
A. Coaxial cableB. Fibre Optic Cable C. Shielded Twisted Pair D. Unshielded Twisted Pair
12. Device A in Figure 3 refer to Peranti A dalam Rajah 3 merujuk kepada
FIGURE 3RAJAH 3
A. switchB. modemC. access pointD. network interface card
3765/1 SULIT
Device A
13. Table 1 shows the activities of computer crime. Jadual 1 menunjukkan aktiviti jenayah komputer
P Computer FraudKomputer
Q Copyright InfringementPencabulan Hakcipta
R Computer TheftKecurian Komputer
S Computer AttackSerangan Komputer
Table 1Jadual 1
Based on Table 1 write P, Q, R or S for the following statement:Berdasarkan Jadual 1 tuliskan P, Q, R atau S bagi pernyataan berikut:
i) Ahmad received multiple advertisement hoaxes in his email account.Ahmad menerima pelbagai iklan didalam akaun emailnya. : ___________S
ii) Abu transfer his company profit to his own account. : ___________RAbu memindahkan keuntungan syarikat ke dalam akaun peribadinya
iii) Ali downloaded an assignment from the internet and claimed it is his. : _______Q
Ali memuat turun tugasan dari internet dan mendakwa kepunyaanya.
14. Figure 5 shows some examples of application software: Rajah 5 menunjukkan sebahagian contoh perisian aplikasi
P Q R S T
Based on Figure 5, match the correct application software to its purpose: Berdasarkan Rajah 5, padankan perisian aplikasi yang bersesuaian
i) creating letters and memos : ___________ membuat surat dan memo
ii) managing financial accounts : ___________ mengurus akaun kewangan
iii) presenting ideas to an audience: _________ persembahan maklumat kepada penonton
3765/1 SULIT
15. Choose your answers from the list below . Pilih jawapan dari senarai yang diberikan dibawah.
Fingerprint RecognitionPengecam CapJari
Voice recognitionPengecam Suara
Iris ScanningPengimbas Iris
Hand Geometry ScanningPengimbas Geomatri Tangan
Figure 4 shows different methods of authentication.Rajah 4 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.
Figure 4Rajah 4
Based on Figure 4, name the method used inBerdasarkan Rajah 4, namakan kaedah yang digunakan dalam
i)__________________________
ii) __________________________
3765/1 SULIT
i) ii)
16. Figure 6 shows three types of cables which are used as physical transmission medium. Rajah 6 menunjukkan tiga jenis kabel yang digunakan sebagai media penghantaran fizikal.
R
S
T
FIGURE 6RAJAH 6
Based on Figure 6, write R, S or T for the following statements.Berdasarkan Rajah 6, tulis R, S atau T bagi pernyataan berikut.a) This cable have two insulated copper wires that are twisted around
each other. ___________
Kabel ini mempunyai dua wayar bersalut kuprum yang terpiuh antara satu sama lain.
b) This cable consists of a single copper wire surrounded by at least three layers ___________
Kabel ini mengandungi satu wayar kuprum tunggal yang dikelilingi oleh sekurang-kurangnya tiga lapisan.
17. Choose Figure R, S or T to match the following statements.Pilih Rajah R, S atau T untuk memadankan kenyataan berikut.
.
a. This network consists of a single central cable to which all computers and devices are connected. : _________________Rangkaian ini terdiri daripada satu kabel tunggal yang menghubungkan semua komputer dan peranti.
b. For this type of network, data travels from one computer to another computer in one direction. : _________________Bagi rangkaian jenis ini, data mengembara dari satu komputer ke komputer lain dalam satu arah.
3765/1 SULIT
R S T
18. Below are the hardware needed while setting network facilities. Name them. Di bawah adalah perkakasan yang diperlukan untuk penyediaan rangkaian. Namakan perkakasan tersebut.
Hardwarei) ii) iii)
19. Fill in the blank with the correct answer. Isikan tempat kosong dengan jawapan yang betul.
i) Electromagnetic waves ranging in frequencies between 3 Kilo Hertz and 1 Giga Hertz are normally called ________________________ . radio waves
Gelombang elektromagnetik yang julat frekuensinya di antara 3 Kilo Hertz dan1 Giga Hertz selalunya dipanggil ________________________ ..
ii) Waves ranging in frequencies between 1 and 300 Giga Hertz are normally called ________________________. Microwaves
Gelombang yang julat frekuensinya di antara 1 dan 300 Giga Hertz selalunya dipanggil ________________________ ..
iii) Remote control devices that we use to control our television or radio at home use________________________ signals infrared Alat kawalan jauh yang digunakan untuk mengawal tv dan radio di rumah menggunakan isyarat________________________
Question 20 – Question 25Write True or False for the following statements :Tuliskan Benar atau Palsu pada pernyataan berikut:
20) Computer system consists of three major hardware components; input devices, output devices and processor.TrueSistem komputer terdiri daripada tiga komponen perkakasan yang utama iaitu peranti input, peranti output dan pemproses.
21) WAN is a network connecting computers within very large areas, such as state, countries and the world. False
WAN adalah rangkaian yang menghubungkan komputer di kawasan yang luas seperti di antara negeri, negara dan dunia.
21) Bus Topology are easy to add or remove any nodes. True Nod didalam Topologi bus adalah mudah untuk ditambah ataupun dibuang.
3765/1 SULIT
22) A network links two or more computers together to enable data and resource exchange. True
Sebuah rangkaian menghubungkan dua atau lebih komputer untuk membolehkan pertukaran data dan sumber.
23Intranet does not have its own firewall to protect from intruders outside an organisation from accessing the company information or data. FalseIntranet tidak menggunakan tembok api sendiri untuk melindungi dari pencerobohan orang luar dari masuk dan mendapatkan maklumat atau data di dalam organisasi
a. All computers in peer-to-peer network have equal responsibilities and capabilities to use the resources available on the network.Semua komputer dalam rangkaian rakan-ke-rakan mempunyai tanggung jawab dan keupayaan yang sama untuk menggunakan sumber dalam rangkaian.True
b. Extranet is a private network that uses internet technology to share information with authorized parties.TrueEkstranet adalah rangkaian persendirian yang menggunakan teknologi Internet untuk berkongsi maklumat dengan pihak yang dibenarkan.
3765/1 SULIT
Answer Sheet
NameIC No Form:
Question No. Candidate’s Answer Marks
1. 12. 23. 34. 45 56 67 78 89 910 1011 1112 1213 i ) 13
ii ) 14iii ) 15
14 i) 16ii) 17
15 i) 18ii) 19iii) 20
16 i) 21ii) 22
17 i ) 23ii ) 23
18 i) 25ii) 26iii) 27
19. i ) 28ii) 29iii ) 30
20 3121 3222 3323 3424 3525 36
TOTAL MARKS
3765/1 SULIT
Section BBahagian B
[20 marks][20 markah]
This section consists of FIVE questions. You are required to answer all questions.Bahagian ini mengandungi LIMA soalan. Anda dikehendaki menjawab semua soalan tersebut.
1. a) Copyright infringement is defined as a violation of the rights secured by Copyright Act.
Pelanggaran hakcipta bermaksud pencabulan ke atas hak-hak yang dilindungi oleh Akta Hakcipta..
Give TWO examples of copyright infringement Berikan DUA contoh pelanggaran hakcipta
i. ___________________________________________ [2 marks]
ii. ___________________________________________ [2 markah]
b) Based on the pictures below, name TWO biometric devices used for authentication. [2 marks]
Berdasarkan rajah di bawah, namakan DUA peranti biometrik yang digunakan untuk tujuan pengesahan. [2 markah]
3765/1 SULIT
i. ______________________ ii. ______________________
2. a. Define ‘computer theft’ and give an example of an activity that reflects computer theft. [2 marks]
Takrifkan ‘pencurian komputer’ dan beri satu contoh aktiviti yang \ menggambarkan pencurian komputer. [2Markah]
________________________________________________________________________
________________________________________________________________________
b. Hacking is a source of threat to security in computer. Define ‘hacking’ and give an example of hacking activity. [2 marks]Pencerobohan adalah satu sumber ancaman kepada keselamatan komputer. Takrifkan ‘pencerobohan’ dan beri satu contoh aktiviti pencerobohan.
[2Markah]
________________________________________________________________________
________________________________________________________________________
3. The diagram below show the network hardware requirement.Diagram dibawah menunjukkan perkakasan rangkaian.
1 X
2 Y
a) State X and Y [2marks] Nyatakan X dan Y [2 markah]
_______________________________________________________________
3765/1 SULIT
b) Explain the function of X and Y [2marks] Terangkan fungsi X dan Y. [2 markah]
_________________________________________________________________
_________________________________________________________________
4. Figure 1 shows some of the components of a computer system. Rajah 1 menunjukkan sebahagian komponen sistem komputer
Based on Figure 1, Berdasarkan Rajah 1.
a) State two differences of user interfaces applied for both software H. [2 marks]Nyatakan DUA perbezaan antaramuka pengguna yang digunakan untuk
kedua-dua perisian H. [2 Markah]
_________________________________________________________________
_________________________________________________________________
b) Identify software I. Name one type of software I and its function. [2 marks]Kenalpasti perisian I. Namakan satu jenis perisian I dan nyatakan fungsinya. [2 Markah]
_________________________________________________________________
_________________________________________________________________
3765/1 SULIT
H I J
DOS WINDOWS ANTI VIRUS ANTI SPYWARE
SOFTWARE
5. FIGURE 2 shows a network. Rajah 2 menunjukkan sebuah rangkaian.
Rajah 2
(a) Explain why PC1 and PC2 are not able to communicate with each other. [2 marks] Jelaskan kenapa PC1 dan PC2 tidak boleh berkomunikasi antara satu sama lain. [2 Markah]
_________________________________________________________________
_________________________________________________________________
(b) Redraw the table below and write the configuration of network connection for PC1 and PC2 so that both computers are able to communicate with each other.
[2 marks] Lukiskan semula jadual dibawah dan tulis konfigurasi rangkaian untuk PC1 dan PC2 supaya kedua-dua komputer dapat berkomunikasi. [2 Markah]
Computer IP address Subnet MaskPC1PC2
3765/1 SULIT
PC1IP address: 192.168.1.5Subnet mask: 255.255.253.0Gateway: 192.168.1.1
PC2IP address: 192.168.1.5Subnet mask: 255.255.253.0Gateway: 192.168.1.1
ADSL modemIP address: 192.168.1.1Subnet Mask: 255.255.255.0
FIGURE 2
INTERNET
SECTION C[ 14 MARKS ]
This section consist of three questions. You are required to answer two questions only:
(i) Question 33 is compulsory, and(ii) Either Question 31 or Question 32
Question 31
Figure 1 shows the component of computer system
Figure 1
(a) Based on Figure 1, draw the information processing cycle in block diagram accordingly. [2 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
(b) Explain two functions of component A [2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3765/1 SULIT
(c) Differentiate between component B and component C [2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(d) Give one example of component C other than shown in the figure 1 [1 mark]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Question 32
Figure 2 shows computer network topologies.
Topology A Topology B Topology C
Figure 2
(a) Based on the Figure 2, give the name of:
i. Topology A : _____________________________________________
ii. Topology B : _____________________________________________
iii. Topology C : _____________________________________________
[3 marks]
3765/1 SULIT
(b) Give two disadvantages of Topology B [2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(c) Differentiate between Topology A and Topology C [2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Question 33
Figure 3 shows three computers with system software and application software.
Figure 3
(a) Based on the figure 3, define the meaning of application software and give one example. [2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3765/1 SULIT
MS DOSWord starDbaseAVG Antivirus
Windows XPMicrosoft ExcelNorton Antivirus
Windows 98Word 2000Microsoft AccessPc-cillin Antivirus
Computer X Computer Y Computer Z
(b) State two (2) differences between system software and application software.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________ [4 marks]
(c) Why Computer X needs to install the AVG Antivirus Software?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________[1 mark]
3765/1 SULIT