Escolar Documentos
Profissional Documentos
Cultura Documentos
KP:
TINGKATAN : .
SULIT
3765/1
ICT 1
Mei 2010
2 Jam
Kertas 1
2 Jam
C.
2. Kertas soalan dan jawapan ini hendaklah diserahkan pada akhir peperiksaan.
[Lihat
Sebelah
SULIT
NAMA: .NO. KP:
TINGKATAN : .
-2-
NAMA: .NO. KP:
TINGKATAN : .
Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1. Based on Diagram, X is best described as
Diagram
A spam
B cookies
C spyware
D electronic profile
2. Bit is the smallest unit of data a computer can process. Byte is unit of information built
from bits. One byte is equal to _____________ bit.
3. Computer crimes include computer fraud, computer infringement, computer theft and
computer attack. State the name of crime activity for Situation.
Raju received an e-mail inviting him to invest in a Skim Cepat Kaya investment. Raju took action
as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM
100,000.00 in two weeks, but after two weeks, nothing happened.
Situation
Computer crime for this case is _______________________________
i _______________
ii ______________
iii ______________
5. Write True or False in the spaces provided in Answer Sheet based on statement below.
Pornography can lead to criminal acts such as exploitation of women and children. _____
NAMA: .NO. KP:
TINGKATAN : .
-3-
6. Windows XP, Macintosh OS X, and Linux Suse are examples of
A Application Software
B Web Browser
C Operating Systems
D Shareware program
9. Write True or False in the spaces provided in Answer Sheet for statement below.
i Jamal wants to send a file to Wong using electronic mail services. He must
ensure that the file is free from virus before it is sent. Jamal uses application
software to ensure the file is virus-free before it is sent. ______
ii Wong downloads and save that file in secondary storage like flash drive. ______
TINGKATAN : .
J : _________
K: ________
b. Type commands or press special keys on the keyboard to enter data and instructions
that instruct the operating system what to do. It has to be typed one line at a time.
These statements refer to _____________.
-4- connects networks in an area such as a
12. A _____________ is a high-speed network that
city or town and handles the bulk of communications activity across that region.
13. Write true or false in the spaces provided in Answer Sheet for statement below.
ii Extranet is a private network that uses internet technology to share information with
authorized parties. _____
14. Ali connects three computers in his office through hub and server. The type of network
that he used is called a ____________. Alis customer, David who lives in Singapore
connects his computer to Alis new networks. This type of network is called a
__________________ .
15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces
provided in Answer Sheet.
NAMA: .NO. KP:
TINGKATAN : .
Item Statement
TABLE
Match the correct items that represent the statement that best describe the hardwares
given below.
i Modem : _________
ii Router : _________
iii Network Interface Card : _______
16. A movie that combines audio, graphics and animation is still considered as a __________
multimedia content since the user is a passive receiver of the content.
A linear
B graphic
C animation
D non-linear
-5-
17.
I Implementation
II Evaluation
III Design and Develop
IV Testing
V Analysis
VI Publishing
18. Write True or False in the spaces provided in Answer Sheet for statement below.
Linear interactivity allows the user to interact with the content according to what the user
wants.
19. Table shows the multimedia development phase, based on the description given identify
phases Y and Z, write the answer in spaces provided in Answer Sheet .
Phase Description
NAMA: .NO. KP:
TINGKATAN : .
TABLE
Y:_______________________ Z: _______________________
22. A ______________interactivity allows the user to control the progress of the content.
23. Give an example of editing software that can be used to produce multimedia presentation
using text editor.
24. Give an example of editing software that can be used to produce multimedia presentation
using video editor.
A. I and II
B. II and III
C. III and IV
D. II, III and IV
-6-
Section B
[20 Marks]
This section consists of five questions. You are required to answer all questions.
Haziq gemar melayari internet. Pada suatu hari, semasa Haziq sedang melayari internet, beliau
mendapati komputer beliau tidak laju seperti biasa. Beliau juga mendapati bahawa LED pada
modem berkelip walaupun beliau tidak lagi melayari internet. Komputer beliau juga reboot.
Haziq pasti terdapat pengguna lain yang telah memasuki sistem komputernya.
TINGKATAN : .
b. State two things that Haziq can do to enhance the security of his data while
accessing the Internet.
[2 marks]
INPUT B OUTPUT
a. Component B contains the control unit and arithmetic and logic unit. State
one function for each of the component.
[2 marks]
b. Component D can be classified into two categories. State two the differences
between two of categories.
[2 marks]
-7-
28 Based on Situation, answer the following question:
Julia has purchased a commercial application software and she uploads the
software to her web site for others to download it.
Julia telah membeli perisian aplikasi komersil dan dia telah memuat naik perisian itu ke
laman webnya bagi membolehkan orang lain memuat turunnya.
Johan has downloaded an open source application software from the Internet. He
then duplicates the software and distributes to his friends.
Johan telah memuat turun perisian aplikasi sumber terbuka dari Internet. Kemudian, dia
membuat salinan perisian tersebut dan mengedarkan kepada rakan-rakannya.
(a) Who has committed in computer crime? State the type of computer crime
he/she has committed.
[2 marks]
(b) State two reasons why do we need Cyber Law.
[2 marks]
(a) Malaysian Government has passed several cyber laws to control the Internet
abuse. Four cyber law acts in Malaysia are
NAMA: .NO. KP:
TINGKATAN : .
(b) Lee, a bank officer, has hacked his clients account to get information for his
own use. He can be convicted under _____________________ Act 1997.
Computer crime for this case ________________
[2 marks]
(a) Based on the table 1, choose one example for suitable task given.
Task 1: Coordinates all the activities among the computer hardware devices.
(b) State two differences between proprietary and open source software.
[2 marks]
-8-
NAMA: .NO. KP:
TINGKATAN : .
Section C
[14 marks]
This section consists of 3 questions. You are required to answer 2 questions.
Situation:
Your school is going to have a new intake for the Form 1 students. As a ICT student, you are given
the responsibility by your principal to produce a multimedia project which will include all the
information about your school for the parents and the new students. Your first slide should have your
school name, batch, and school song as background music. Your multimedia project must be both
informative and interactive with suitable linking button to allow user choose their interest information.
Network B
Network A Server
Modem
Intern
et
Figure
Name the topology of Network A. Give two advantages for topology in Network A.
M0dem
State two computer security threats that will be faced by CMA Company through its
computer network and explain one of the security measures that can be applied to avoid
the security threats.
[7 marks]
33 Answer questions based on the given situation.
Prizes won by Ahmad in a contest is a computer. The computer does not have any
software. Explain what to do by Ahmad to enable him to use the computer.
[7 marks]
~ End Of Questions ~
-9-