Vous êtes sur la page 1sur 6

SECTION A MARKING SCHEME Question No.

1 2 3 4 i 5 ii iii 6 7 8 9 i 10 ii iii 11 12 13 14 Answer C The collection of raw D - Reading, Investigation, study B - Basic knowledge C Violating the rights.. CHARACTER COMPUTER CRIME E-COMMERCE FALSE MULTITASKING D ( I, II, III, IV) C RAM KEYBOARD PRINTER Diskette / floppy disk /pen drive / thumb drive / hard disk / cd rom / dvd rom (ANY ONE OF SECONDARY STORAGE) B - DECODE A 1000 Megahertz (MHz) D Storage device WINDOW NT , WINDOW 2000 SERVER, REDHEAT LINUS , UNIX, SOLARIS, SAMBA, MAC OS-X (any two ) BUS STAR Coaxial cable C - ( I and IV ) PROJECT MANAGER CONSISTENCY H - VIDEO B ( I, iii, ii ) ( Fortran, SQL, PROLog ) D - ( decision symbol) ASSEMBLER INTERPRETER TRUE FALSE C - MANAGEMENT B - IMPLEMENTATION C - MAINTENANCE A - ANALYSIS Marks 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 TOTAL MARKS

i ii i ii iii

15

16 17 18 19 20 21 22 23 24 25

i ii i ii i ii iii

SECTION B

26a. 26b.

Intellectual Property refers to works created by inventors, authors and artists. These works are unique and have value in the market place cover ideas, inventions, literary creations, unique names, business models, industrial processes, Trademarks, Trade/company names , Copyrights , Patents ( any two ) Software Z - Utility software Difference between antivirus and anti spyware : ( ANY of the one ) SPYWARE Spyware is a program placed on a computer without the users knowledge. It secretly collects information about the user. The spyware program communicates information to the outside source.

27a.

ANTIVIRUS An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files. An antivirus program scans for programs that attempt to modify the boot program, the operating system and other programs that normally are read from but not modified used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. Programs may also prevent and remove adware, spyware, and other forms of malware.

spyware is secretly installed on the user's personal computer

Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.

b.

Y APPLICATION SOFTWARE i. Programs that perform specific tasks for users, which include word processing, spreadsheet, database, presentation e-Mail and Web browser software. Examples of application software are Microsoft Word, Microsoft Excel, Outlook Express and Internet Explorer. ii. Provide the environment to enable users to accomplish specific task. ( any of the one )

28.a.

M HUB

b. c.

Function of M Control the flow of communication in the network. i. ii. Personnal Computer Laptop A wireless network interface card. A communication device that enables a computer or device to access a wireless network. A Router A Communication device that connects multiple computers and transmits data. It also allows multiple computers to share a single high-speed internet connection.

Other device which are possible. 29.a. b. Phase 2 Tool A Storyboard. User interface principles of CONSISTENCY , means the interface design is in harmony and the same applies to all the screen ( page ) in a software program. That also goes to the menus and other same function throughtout the user interface. Phase X Phase Y Program Design Phase Implementation Phase

30a. b. c.

Tool Used Flow Chart. Top-down design, pseudo code ( any one ) Statement Z 1. To tell the programmer about the following functions in use.. 2. Internal comments within program. It explain the purpose of the code statement within the program. 3. This statements mostly address to other programmers who may have to make corrections or modification to the programs. ( any one of the above )

SECTION C

31 a
1 2 3 4 NIC card RJ 45 Hub Router

b. My suggestion : Local Area Network


The Advantages : LAN is operated within a limited physical area, such as at home, school, a single building or several buildings. Consists of less than 500 interconnected devices across several building is still recognised as a LAN. The simplest form of LAN is to connect two computers together. Local Area Network (LAN) is the smallest network compared to the other two networks. Inexpensive hardware used in LAN previously includes twisted pair, coaxial cables and the higher end is fiber optic or wireless. However, coaxial cables are now being replaced by a higher speed cabling system such as CAT5 using RJ45 connectors.

c. Topology : Star
Advantage [ 3 points]

i) ii) iii) 32
a)

Fault in one node does not affect others. Transfering data control by server No collision of data while transfering data.

Constant the length and width has been given Reason: cannot be change if you restart again Variable the height insert by user Reason : can insert by user with different value and computer could calculate the volume.

b)

ATURCARA MENGIRA ISIPADU AIR DALAM AKUARIUM Length 150 Width 45 cm cm

Please insert the level of water. Height cm 8 The volume of water is Input interface ATURCARA MENGIRA ISIPADU AIR DALAM AKUARIUM Length 150 Width 45 cm cm cm3

Please insert the level of water. Height cm 8 The volume of water is 5400 0 Output interface 33 ( i ) Cocu. To view the grade of ccurriculum activities for each student, we have to use Cocu field so that you can know the cocurriculum grade. If we used Position field, we cannot know the the grade is for which cocurriculum activities. (ii) Class Stu_ID Name Position Cocu 4A R001 Amin Member Computer Club 4C R002 Gopal President Computer Club 5B R004 Ah Soon Secretary Computer Club ( iii ) Implementation Phase. In system development, the activities involved are develop program using database software. 1 marks 1 marks cm3

3 marks
(3 records)

1 marks 1 marks

Vous aimerez peut-être aussi