Escolar Documentos
Profissional Documentos
Cultura Documentos
2007 26. ICT & Society Ways of making personal data more private
State 2 examples for ethical Type of software ; Reason choose email & law breaking Open source & proprietary 3 reasons why email better software. than sms Reason choose the type of software.
27. Network
27. Network
27. Programming
27. Network
Differences between open Differences on how data source & closed source being transmitted between ring topology & star topology. 2 advantages of ring topology 28. Network Differences between internet & intranet Differences between topologies & network architecture 28. Network
State the name of the type State the data type used. Explain the structure of the of network architecture network in figure shown Identify the control structure Give one feature of the type & justify the answer. of network. Sketch the network architecture. 28. Multimedia 28. Network 28. ICT & Society
State type of network Identify the type of web communication technology editor from the statement given & Give 2 reasons why give reason interface web editor Differentiate between attracted more students extranet & internet. than interface text editor. 29. Programming
Explain the type of network State 2 ways that causes popup messages appear on the Suggest the type of network computer screen communication technology & justify the answer State 2 kinds of serious damages if user ignore the message 29. Multimedia 29. Computer Systems
List 2 uses of the Identify the element in State the data type used in a 2 advantages using the type Suggest a type of software to information from database. program as a constant & give program and give a reason. of web editor shown in be used & give a reason why reason. figure. choose it. State problems that may Why numerator declared as arised by shared data. Identify control structure is a constant and give a User interface principle used in the flow chart & give reason. suggest 2 ways to improve reason. the design in the figure shown 30. Multimedia 30. Information Systems 30. Information Systems 30. Information Systems 30. Information Systems
List advantages of using Identify the suitable fields encyclopedia stored on CD Complete the query results
Group the attributes into 2 Example of components in Identify attributes of the tables & draw a line to IS. Describe the interrelation table given show the relationship between the components
31. Network
31. Programming
31. Programming
Describe 2 suitable security State the name of the measures to prevent computer that is not computer crime. configured to be in the Identify hardware to network (IP address) & provide internet access & Why bank clients should be justify the answer. the function protected under Malaysian Cyber Law. Explain 2 causes of the outcome of the ping process from PC 32. ICT & Society Explain computer threat 32. Network 32. Programming
Draw a flow chart based on Identify the input & output the user interface given. Write the formula used Sketch a design of input interface
Describe 2 types of computer Identify 2 variables Identify the type of computer Type of utility program used network. Describe types of threats & give 2 advantages of it Explain actions on human Write the pseudo code for network communication aspect on security the program Give 2 examples of Explain how student transfer technologies. procedure to increase computer threats that file using the same security at the computer storage medium to another Give 2 reasons why control room. computer and open the file computer affected by for editing computer threat & suggest 2 ways to prevent it 33. Information Systems 33. Information Systems Data manipulation Identify & explain State the data type for the data item required for the coupon system. 33. Information Systems 33. Programming Prepare a report design State 4 activities in phase program analysis 33. Multimedia Sketch the screen design for main menu page
Identify the type of error & Explain 2 user interface used justify the answer. in the design of the page.