17
LAMPIRAN C Soalan-soalan berdasarkan Pentaksiran Kerja Kursus. LA1 1.3.3 .2 Apply the correct security procedures. i. Antivirus, ii. Anti-Spyware, iii. Cryptography, iv. Firewall, v. Data backup and vi. Human aspects 5. Figure 3 shows how cryptography works. Rajah 3 menunjukkan bagaimana kriptografi dilaksanakan. Figure 3 Rajah 3 Name H : Namakan : H Source Year Leve l Bloom SPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised access to the contents of the file? Laila perlu menghantar satu fail dokumen yang mengandungi maklumat sulit kepada pengurusnya melalui e- mel. Apakah yang perlu dilakukan oleh Laila untuk menghalang capaian tidak sah ke atas kandungan fail itu? A. Back up the file Menbuat sandaran bagi fail itu B. Encrypt the file Mengenkrip fail C. Install firewall Memasang tembok api D. Scan the file for viruses Scan the file for viruses Source Year Leve l Bloom SPM 2008 32. Figure 20 shows symptoms of a computer problem Screen displays unsual messages Files become corrupted Files mysteriously appear Figure 20 Based on figure 20: Suggest two ways to prevent it. Source Year Leve Bloom Plaintext Teks biasa H Plaintext Teks biasa Encrypt Enkrip Decrypt Dekrip

rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

LAMPIRAN CSoalan-soalan berdasarkan Pentaksiran Kerja Kursus.

LA1

1.3.3.2

Apply the correct security procedures. i. Antivirus, ii. Anti-Spyware, iii. Cryptography, iv. Firewall, v. Data backup and vi. Human aspects

5. Figure 3 shows how cryptography works.Rajah 3 menunjukkan bagaimana kriptografi dilaksanakan.

Figure 3 Rajah 3Name H : Namakan : H

Source Year Level

Bloom

SPM 2007

2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised access to the contents of the file?Laila perlu menghantar satu fail dokumen yang mengandungi maklumat sulit kepada pengurusnya melalui e-mel. Apakah yang perlu dilakukan oleh Laila untuk menghalang capaian tidak sah ke atas kandungan fail itu?

A. Back up the file Menbuat sandaran bagi fail ituB. Encrypt the file Mengenkrip failC. Install firewall Memasang tembok api

D. Scan the file for viruses Scan the file for viruses

Source Year Level

Bloom

SPM 2008

32. Figure 20 shows symptoms of a computer problem

Screen displays unsual messages Files become corrupted Files mysteriously appear

Figure 20

Based on figure 20:

Suggest two ways to prevent it.

Source Year Level

Bloom

SPM 2010

PlaintextTeks biasa H

PlaintextTeks biasa

EncryptEnkrip

DecryptDekrip

Page 2: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

LA2

2.4.1.1 Assemble the components of a PC.

1. When placing a CPU onto a ZIF socket, Pin 1, as shown in Figure 4, Pin 1 can be placed at any one of the four corners of the socket. Semasa menempatkan cPU ke atas soket ZIF, Pin l, seperti dalamRajah 4, boleh ditempatkan pada mana-mana penjuru soket itu.

Source Year

Level

Bloom

SPM 2010

Senarai Hasil Pembelajaran LA2 yang belum diuji.

2.4.2.1 Format and partition the hard disk.

2.4.3.1Install operating system, application software and utility programs.

2.5.2.2 Explain pervasive computing.

Page 3: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

LA3

3.4.2.1Crimp and test UTP cable: i. Straight cable and ii. Crossed cable

11 Figure 6 shows the steps taken during the crimping of a UTP cable.Rajah 6 menunjukkan langkah-langkah yang diambil semasa 'crimp' kabel UTP.

Figure 6 Rajah 6

Based on Figure 6, state the steps in:Berdasarkan Rajah 6, nyatakan langkah-langkah dalam:

(i) Q(ii) S

Page 4: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Source Year Level

Bloom

SPM 2009

3.4.3.1

Configure the workstation to join a Local Area Network : i. Internet Protocol (IP) Address, ii. Subnet Mask and iii. Server name

31(a) Figure 13(a) shows the network configuration of four computers in a Class C network. The computers are named PC01, PC02, PC03 and PC04.Rajah 13(a) menunjukkan konfigurasi rangkaian bagi empat buah komputer dalam rangkaian kelas C. Komputer-komputer itu diberi nama PC01, PC02, PC03 dan PC04.

Figure 13(a) Rajah 13(a)

Based on Figure 13(a), Berdasarkan Rajah 13(a),

(a) (i) State the name of the computer that is not configured to be in the network. Namakan komputer yang tidak dikonfigurasikan untuk berada dalam rangkaian.

(ii) Justify your answer. Berikan justifikasi anda.

Page 5: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Source Year Level

Bloom

SPM 2009

3.4.3.2 Test the network connection.

31(b) Figure 13(b) shows the outcome of two ping processes. Rajah 13(b) menunjukkan hasil dua proses ping.

Figure 13(b) Rajah 13(b)

Page 6: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Based on Figure 13(a) and Figure 13(b), Berdasarkan Rajah 13(a) dan Rajah 13(b),

(b) PC04 is switched on and running correctly.Explain two causes of the outcome of the ping process from PC04. PC04 dihidupkan dan berfungsi dengan baik.

Terangkan dua sebab terhasilnya proses ping daripada PC04.

Source Year Level

Bloom

SPM 2009

Senarai Hasil Pembelajaran LA3 yang belum diuji.

3.4.1.1 Insert network interface cards (NIC).3.4.1.2 Install drivers for the NIC.3.4.2.2 Create awareness of the correct way when crimping a cable.3.4.4.1 Create a shared folder.

3.5.1.1

Describe i. Mobile Computing (specifications, services, frequencies), ii. Internet Technology and Services (VOIP, BLOG) and iii. Types of network (examples: PAN, VPN, WLAN, WIMAX)

LA4

1. Figure 17 shows a web page in a web editorRajah 17 menunjukkan laman web dalam suatu editor web.

Figure 17 / Rajah 17

Based on user interface principles, give two modifications which would improve the design.

4.3.1.2 Apply suitable user interface principles in a project.

Page 7: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Berdasarkan prinsip antara muka pengguna, berikan dua pengubahsuaian supaya dapat meningkatkan reka bentuk itu.

Source Year

Level

Bloom

SPM 2010

15 Write the words that would complete the following statement:Tulis perkataan yang dapat melengkapkan pernyataan berikut:

According to the .........(i)......... design principle, "Proximity" states that, things that are close together will be seen as .........(ii).........Menurut prinsip reka bentuk .........(i).........,. "Proximity" menyatakan bahawa, objek-objek yang rapat akan kelihatan seperti .........(ii)..........

Source Year Level

Bloom

SPM 2009

Senarai Hasil Pembelajaran LA4 yang belum diuji.

LA5

5.2.2.1 Apply program development phases to solve problems.

33. The following statement explains the operation of a taxi company.Pernyataan berikut menerangkan tentang operasi sebuah syarikat teksi.

4.3.3.2Apply all the phases of multimedia production to produce an interactive educational multimedia project.

4.4.1.1Give an example of immersive multimedia in education, business or entertainment.

Smart Cab is a taxi company operating in Seri Wangi Mall. The company is going to use computers for its coupon system.

The coupon should display the following data items : Receipt number (auto generated) Cashier’s name Date Fare

Smart Cab ialah sebuah syarikat teksi yang beroperasi di Seri Wangi Mall. Syarikat tersebut akan menggunakan komputer untuk sistem kuponnya.

Kupon tersebut mestilah memaparkan item data berikut: Nombor resit (dijana secara automatik) Nama juruwang Tarikh Tambang

Page 8: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Based on the above statements : Berdasarkan penyataan itu :

a) State the data type for the first three data items required for the coupon systemNyatakan jenis data untuk tiga item data pertama yang diperlukan untuk system kupon itu.

b) Using the information and data given in the statement, create the output of the coupun that will be used by the taxi company.Dengan menggunakan maklumat dan data di dalam pernyataan, hasilkan kupon yang akan digunakan untuk syarikat teksi itu.

Source Year Level

Bloom

SPM 2008

32 Figure 14 shows goods on sale in a shop.Rajah 14 menunjukkan barang-barang jualan murah di sebuah kedai.

Figure 14 Rajah 14

Based on Figure 14, you are asked to develop a program to calculate the final I)i is c of each item.

Berdasarkan Rajah 14, anda dikehendaki membina satu program untuk menghitung harga muktamad setiap barang.

(b) Write the pseudo code for the program. Tulis kod pseudo untuk program itu.

Source Year Level

Bloom

SPM 2009

Page 9: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

1. Table 4 shows text and grading range for all subjects in Sekolah Menengah Kebangsaan Pelita.Jadual 4 menunjukkan teks dan julat gred bagi semua mata pelajaran di SMK Pelita.

Based on the text: / Berdasarkan teks itu:

(a) State four activities which will be performed by Ahmad in program analysis.Nyatakan empat aktiviti yang akan dilakukan oleh Ahmad dalam menganalisis program.

(b) Ravi tested the system and entered the mark 69 and,the output is grade D.Ravi menguji sistem dengan memasukkan markah 69 dan outputnya menunjukkan gred D.

Page 10: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

(i) What type of error is this? / Apakah jenis ralat ini?(ii) Justify your answer. / Berikan justifikasi anda.

Source Year

Level

Bloom

SPM 2010

LA6

6.3.2.3 Classify project requirements into two tables.6.3.2.4 Design database tables.

30 The following are attributes for a library database.Berikut adalah atribut untuk pangkalan data perpustakaan.

(a) (i) Group the attributes into two related tables.Kumpul atribut itu ke dalam dua jadual yang berhubungan.

Source Year Level

Bloom

SPM 2009

6.3.2.6 Create two tables that include the primary key in each table.

33. Figure 13 shows an interface of an automated library system of SMK Indah.

SMK IndahLibrary Management System

Book Information

Book ID QuantityTitle Author

book titletajuk buku

supplier IDID pembekal

book authorpengarang buku

book IDID buku

Supplier addressalamat pembekal

Supplier namenama pembekal

Page 11: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Edition YearPublisherSynopsis

Update Menu Insert Delete

b) Which field is the primary key? [1 marks]

Field : ________________________

6.3.2.7 Build a relationship between two tables.

30 The following are attributes for a library database.Berikut adalah atribut untuk pangkalan data perpustakaan.

(a) (i) Group the attributes into two related tables.Kumpul atribut itu ke dalam dua jadual yang berhubungan.

(ii) Draw a line to show the relationship between the two tables.Lukis satu garisan untuk menunjukkan hubungan di anlara kedua-dua

jadual itu.

(b) State the type of relationship. Nyatakan jenis hubungan itu.

Source Year Level

Bloom

SPM 2009

6.3.2.10Create a query to retrieve required information with one or more conditions.

30. Figure 10(a) shows two tables created in the school co-curriculum system at Sekolah Menengah Batu Tiga.Rajah 10(a) menunjukkan dua jadual yang dibina dalam system kokurikulum di Sekolah Menengah Batu Tiga.

book titletajuk buku

supplier IDID pembekal

book authorpengarang buku

book IDID buku

Supplier addressalamat pembekal

Supplier namenama pembekal

Page 12: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Figure 10(a) Rajah 10(a)Figure 10 (b) shows a Simple Query Wizard.Rajah 10 (b) menunjukkan Simple Query Wizard

Figure 10(b) Rajah 10(b)

a) Based on Figure 10(a) and Figure 10(b), state one more field that should be moved to the list X in Figure 10 (b), to view the grades of co-curricular activities for each student.Berdasarkan Rajah 10(a) dan Rajah 10(b), nyatakan satu medan tambahan yang perlu dipindahkan ke senarai X dalam Rajah 10(b), untuk memaparkan gred aktiviti kokurikulum untuk setiap pelajar.

Figure 10(c) shows a query design to retrieve information based on a certain criterion.Rajah 10(c) menunjukkan satu query design untuk mencapai semula maklumat berdasarkan criteria tertentu.

Page 13: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Figure 10(c) Rajah 10(c)

b) Based on the query design in Figure 10(c), complete the query results below to show the information obtained.Berdasarkan kepada query design dalam Rajah 10(c), lengkapkan keputusan query di bawah untuk menunjukkan maklumat yang diperoleh.

Class Stu_ID Name Postion CoCu

Source Year Level

Bloom

SPM 2008

6.3.2.11 Generate a report.

33 The following are dialogue between a computer sales manager and a programmer. Berikut adalah perbualan di antara seorang pengurus jualan komputer dan seorang pengaturcara.

Page 14: rmmict.files.wordpress.com · Web viewSPM 2007 2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised

Based on the dialogue, prepare the report design to be generated by the Database Management Systems.

Berdasarkan dialog di atas, sediakan reka bentuk laporan yang akan dijana oleh Database Management Systems.

Source Year Level

Bloom

SPM 2009

Senarai Hasil Pembelajaran LA6 yang belum diuji.

6.3.2.1 Identify a project.6.3.2.2 Identify the project requirements.6.3.2.5 Create a database.6.3.2.7 Build a relationship between two tables.

6.3.2.10Create a query to retrieve required information with one or more conditions.

6.3.2.11 Generate a report.

6.3.2.12Gather all the documents from the above phases into a folio.