Académique Documents
Professionnel Documents
Culture Documents
1 2 3 4 i 5 ii iii 6 7 8 9 i 10 ii iii 11 12 13 14 Answer C The collection of raw D - Reading, Investigation, study B - Basic knowledge C Violating the rights.. CHARACTER COMPUTER CRIME E-COMMERCE FALSE MULTITASKING D ( I, II, III, IV) C RAM KEYBOARD PRINTER Diskette / floppy disk /pen drive / thumb drive / hard disk / cd rom / dvd rom (ANY ONE OF SECONDARY STORAGE) B - DECODE A 1000 Megahertz (MHz) D Storage device WINDOW NT , WINDOW 2000 SERVER, REDHEAT LINUS , UNIX, SOLARIS, SAMBA, MAC OS-X (any two ) BUS STAR Coaxial cable C - ( I and IV ) PROJECT MANAGER CONSISTENCY H - VIDEO B ( I, iii, ii ) ( Fortran, SQL, PROLog ) D - ( decision symbol) ASSEMBLER INTERPRETER TRUE FALSE C - MANAGEMENT B - IMPLEMENTATION C - MAINTENANCE A - ANALYSIS Marks 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 TOTAL MARKS
i ii i ii iii
15
16 17 18 19 20 21 22 23 24 25
i ii i ii i ii iii
SECTION B
26a. 26b.
Intellectual Property refers to works created by inventors, authors and artists. These works are unique and have value in the market place cover ideas, inventions, literary creations, unique names, business models, industrial processes, Trademarks, Trade/company names , Copyrights , Patents ( any two ) Software Z - Utility software Difference between antivirus and anti spyware : ( ANY of the one ) SPYWARE Spyware is a program placed on a computer without the users knowledge. It secretly collects information about the user. The spyware program communicates information to the outside source.
27a.
ANTIVIRUS An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files. An antivirus program scans for programs that attempt to modify the boot program, the operating system and other programs that normally are read from but not modified used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. Programs may also prevent and remove adware, spyware, and other forms of malware.
Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.
b.
Y APPLICATION SOFTWARE i. Programs that perform specific tasks for users, which include word processing, spreadsheet, database, presentation e-Mail and Web browser software. Examples of application software are Microsoft Word, Microsoft Excel, Outlook Express and Internet Explorer. ii. Provide the environment to enable users to accomplish specific task. ( any of the one )
28.a.
M HUB
b. c.
Function of M Control the flow of communication in the network. i. ii. Personnal Computer Laptop A wireless network interface card. A communication device that enables a computer or device to access a wireless network. A Router A Communication device that connects multiple computers and transmits data. It also allows multiple computers to share a single high-speed internet connection.
Other device which are possible. 29.a. b. Phase 2 Tool A Storyboard. User interface principles of CONSISTENCY , means the interface design is in harmony and the same applies to all the screen ( page ) in a software program. That also goes to the menus and other same function throughtout the user interface. Phase X Phase Y Program Design Phase Implementation Phase
30a. b. c.
Tool Used Flow Chart. Top-down design, pseudo code ( any one ) Statement Z 1. To tell the programmer about the following functions in use.. 2. Internal comments within program. It explain the purpose of the code statement within the program. 3. This statements mostly address to other programmers who may have to make corrections or modification to the programs. ( any one of the above )
SECTION C
31 a
1 2 3 4 NIC card RJ 45 Hub Router
c. Topology : Star
Advantage [ 3 points]
i) ii) iii) 32
a)
Fault in one node does not affect others. Transfering data control by server No collision of data while transfering data.
Constant the length and width has been given Reason: cannot be change if you restart again Variable the height insert by user Reason : can insert by user with different value and computer could calculate the volume.
b)
Please insert the level of water. Height cm 8 The volume of water is Input interface ATURCARA MENGIRA ISIPADU AIR DALAM AKUARIUM Length 150 Width 45 cm cm cm3
Please insert the level of water. Height cm 8 The volume of water is 5400 0 Output interface 33 ( i ) Cocu. To view the grade of ccurriculum activities for each student, we have to use Cocu field so that you can know the cocurriculum grade. If we used Position field, we cannot know the the grade is for which cocurriculum activities. (ii) Class Stu_ID Name Position Cocu 4A R001 Amin Member Computer Club 4C R002 Gopal President Computer Club 5B R004 Ah Soon Secretary Computer Club ( iii ) Implementation Phase. In system development, the activities involved are develop program using database software. 1 marks 1 marks cm3
3 marks
(3 records)
1 marks 1 marks