Académique Documents
Professionnel Documents
Culture Documents
Tingkatan: 4A
3765/1
ICT
Kertas 1
August 2015
2 jam
Kegunaan Pemeriksa
Bahagian
Markah
Penuh
A
36
B
20
C
14
JUMLAH
Markah
ICT Form 4
August 2015
Candidates Answer
True
K
N
Copyright infringement
Computer Crimes Act 1997
Hack/Steal the data, threats from virus/spyware
Install firewall/ anti-spyware/antivirus
Can deliver mail faster, secure and reliable
A
Cryptography
B
Arithmetic and Logic Unit (ALU)
Control Unit (CU)
Key in Password
01010110,01001100,01001111
Expansion card slot
Scanner
Printer
ROM
RAM
Extranet
Internet
D
C
USB connector
A
D
D
D
Client/Server
Local Area Network (LAN)
B
Network Operating System (NOS)
To facilitate and monitor the computer network
Files Transfer Protocol (FTP)
Easy to manage and monitor network/share the software
Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
ICT Form 4
August 2015
28
29
30
(a) Open source is a software development model where its source code is
made available to the public under a license where copyright holder
provides the rights to study, change and distribute the software at no cost
to anyone and for any purpose.
(b) Linux/ freeBSD/ openBSD
(a)
W/G
G
W/O
B
W/B
O
W/C
C
W/O
O
W/G
B
W/B
G
W/C
C
(b) 1, 2, 3, 6
31
1
3
(a) Phishing
1
(b) It is an email fraud method in which the perpetrator sends out legitimate- 2
looking email in an attempt to gather personal and financial information
from recipients.
(c) 1. Install firewall/spam filter/ antivirus or anti-spyware software.
4
This software can filter spam emails.
2. Do not respond to the email that asking for personal information.
Never respond by clicking the hyperlink contained in the email for it
can be a scam.
ICT Form 4
32
August 2015
(a)
Internet
Modem
Router
Switch
(Central host)
PC1
PC4
PC2
PC3