Vous êtes sur la page 1sur 13

PEJABAT PELAJARAN DAERAH PASIR GUDANG

PEPERIKSAAN PERTENGAHAN TAHUN SETARA


SIJIL PELAJARAN MALAYSIA 2010 3765/1
INFORMATION AND COMMUNICATION TECHNOLOGY
Kertas 1
Mei
2 jam

PERATURAN PEMARKAHAN

INFORMATION AND COMMUNICATION TECHNOLOGY

FORM 4

3765/1

Kertas soalan ini mengandungi 5 halaman bercetak .


[Lihat sebelah
SULIT
3765/1 MID YEAR EXAMINATION
SECTION A ( 36 marks )

Answer all questions.

1. What is the fact about information?

A. Information can be only obtained from reading.


B. Information may come in various forms such as articles and charts.
C. Knowledge cannot be acquired through experience or investigation.
D. Messages received trough signs and symbols are not considered as information.

2. The micro processor was invented during the ________________computer era.

A. First generation
B. Second generation
C. Third generation
D. Fourth generation

3. Customers benefit from Electronic Banking in terms of:

I. 24 hours service
II. Electronic Fund Transfer
III. Electronic Cash Deposits
IV. Electronic Loan Application

A. I, II, and III


B. I, II, and IV
C. I, III, and IV
D. I, II, III, and IV

4. Education can be improved by _______________.

I. students being taught by using computers


II. being teachercentred and students are spoon fed
III. having a small number of students in a classroom so that the students can pay attention
IV. students surfing the Net to gather more information more than what was given in the
textbook

A I and III

B I and IV

C I, II, and IV

D I, III, and IV
TRUE and FALSE Questions

5. Through the Internet, communication with anyone and anywhere in the world is possible. TRUE
6. Respecting ownership is the principles governing the affairs of a
community and is enforced by a political authority.
FALSE

State the differences between ETHICS and LAW. Fill in the box with the correct answer.

7.

LAW
a) Depends on country and state where the crime is committed.

b) Universal, can be applied anywhere all over the world. ETHICS

Fill in the blank.

8. All books have All rights reserved clearly printed. This statement means that the book is
subject to the ______COPYRIGHTS_____law. The shape of a handicraft and a composition of
batik pattern can be protected under the_____DESIGNS__right.

Question 9

Match of the following answer.

To identify users by web casting, ecommerce and


other web applications. COOKIES

Unsolicited email messages, advertisements or SPAM


newsgroup postings sent to many

recipients at once.

Refers to a program that collect users


information without the users knowledge SPYWARE
Questions 10.

Match the authentication devices with the correct verification methods.

Padankan peranti pengecaman dengan kaedah pengesahan yang betul.

A Compares live speech with prerecorded I Voice Recognition


speech
Pengecaman Suara Hand
Banding percakapan langsung dengan
percakapan terakam

B Recognises the shape of hand written II Signature Verification


signature
Pengesahan Tanda Tangan
Mengecam bentuk tandatangan

C Involves the measuring and analyzing the III Geometry


shape of hand
Geometry Tangan
Melibatkan ukuran dan analisa bentuk
tangan

11. Which of these is an example of slander?

A. Telling your mother that your brother has a girlfriend.


B. Forwarding a spam email that says McDonalds Malaysia uses contaminated meat
in their burgers.
C. Sending a letter via email to the newspaper, stating that a public officer was accepting
bribery and you have proof that it is true.
D. Broadcasting a story that a housing developer has started building houses in a prime
Malay Reserve land.

12. Below are the examples on how to control the access to controversial content:

I. Install antivirus
II. Referred to by URLs
III. Use filtering software
IV. Rate the content of websites

A. I and II
B. I, II and IV
C. II, III and IV
D. All at the above.
13. Which is the correct example of the Malaysian Cyber Law?

A. CAN-SPAM Act 2003


B. Human Right Act 1974
C. Computer Crime Act 1997
D. Electrical Communications Privacy Act (ECPA) 1986

Question 14

Fill in the box with the correct answer.

Copyright Computer Computer Computer

Infringement Fraud Theft Attack

2. Two companies work together to sell their clients information to other parties COMPUTER THEFT

4. Download as many songs as possible from the Internet. COPYRIGHT


INFRINGEMENT

6. Send a malicious computer code to all people around the world for fun. COMPUTER ATTACK

8. Modify certain parts of an article that resulted in misleading information on the Internet.
COMPUTER FRAUD

10. Change some graphics from the Internet and sell them to interested buyers. COPYRIGHT
INFRINGEMENT

28 m =22m

Question 15

Instruction: Decide whether the statements are TRUE or FALSE.

1. Computer security refers to protecting computer systems only. (F )

2. Hardware security refers to security measures using hardware. (T )

3. Hardware commonly used for computer security is firewall,

PClocks and keyboardlocks. (F )

4. Smart cards and biometrics devices are examples of security

items used to secure a computer network. (T )

5. Computer security can stop unauthorised users from

accessing any part of your computer system. (T )


33m=27m

16. Once the infected file is opened or executed, the _________ could then copy itself into

that particular system and perform its functions.

A. virus
B. hacker
C. Trojan horse
D. malicious code

17. Most ________ programs also protects against worms and Trojan horses.

A. firewall
B. antivirus
C. antispyware
D. data backup

18. The processor is also known as the ___________.

A. CPU
B. RAM
C. input devices
D. output devices

19. Information processing cycle comprises of _____________.

I. input
II. output
III. storage
IV. process

A. I and II
B. I, II, and III
C. I, III, and IV
D. I, II, III, and IV

20. Which one of these is similar to a byte?

A. 8 bits
B. 1 Megabyte
C. 1 Terabyte
D. 1 Gigabyte

21. 1000 MHz is equivalent to __________.

A. 1.0 Hz
B. 0.1 Hz
C. 1.0 GHz
D. 0.1 GHz
22. What is the main reason for using ASCII?

A. To process textual data


B. To achieve compatibility between various types of data processing
C. To purchase components those are compatible with their computer
configurations.
D. To makes it impossible for human to interact with computer.

23. Figure 1 shows to input devices to produce multimedia products.

Gamber 1 menunjukkan alat input untuk menghasilkan produk multimedia.

A B

Name A and B

Namakan A dan B

a) A: VIDEOCAM b) B: MICROPHONE

24. The_______________ where the computer memory is placed

into on the computer motherboard.

_________ tempat di mana memori computer diletakkan di papan induk.

A. ports / port

B. RAM slot / RAM slot

C. motherboard / papan induk

D. expansion slot / slot tambahan

25. ROM and Hard disk are examples of secondary storage.

A. TRUE
B. FALSE

ANSWER SCHEME ICT SECTION B (FORM4)

26.

(a) U : secondary storage and its function is to hold data permanent. (2 marks)

(b) (choose 2 answers only )

RAM (Primary Storage ) U ( Secondary Storage )

Volatile hold data only temporarily Non-Volatile - hold data only permanent

More Expensive Cost Cheaper cost

Storage capacity limited Storage capacity unlimited

Compulsory storage Alternative storage

Access time is faster Access time is slower

Portability is fixed Portability is potable

(2 marks)

27.

a) X : decoding

Y : Storing (2 marks)

b) X: To translate the program instructions into signal that computer can execute.

Y : Writing the result of instructions to the memory.

(2 marks)

28.

a) i : Transaction data can be done anywhere and anytime.


ii: It takes shorten time for any transaction data.

iii: more productivity.

(accept the any relevant answer based on situation given )

(2 marks)

b) i. Customer can make any transaction at 24 hour services centre or via online.

ii. Bank administrators can control the entire banking system.

iii. update their account by using online services banking.

iv. Can save their time by using online services.

v. Paperless environment.

(accept the any relevant answer based on situation given ) (2 marks)

29.

a) X: Keyword blocking

Y: Site blocking (2 marks)

b) X : The method uses a list of banned word or objects terms. If found, it will blocked

the page completely, stop downloading the page.

Y : The method use software to list the website that will be blocked by using

software.

(2 marks)

30.

a)
Virus virus is the program that can pass on the malicious code to
other program by modifying them. It attaches itself to the
program usually files with .doc, .xls and .exe

Trojan Horse Is a program which can perform useful an expected action. It

must be installed by the users or intruders before it can affect

the systems assets.

Trapdoor/Backdoor A feature in a program that allows someone to access the


program with special privileges.

Worm A program that copies itself and spread through the network.

b) Give TWO ways to protect data in the computer :

i. Anti-virus

ii. Anti-spyware

iii. Firewall

iv. Backup Data

v. Crytography

vi. Password

(choose either two answers or relevant answers based the question).

(2 marks)

SECTION C

31.

a. Copyright infringement is defined as a violation (an action (Mention


to break the law) of the rights secured by a Copyright Act. Copyright
Copyright is a set of an exclusive right to control the usage Infringement:
of any ideas or information. 1 mark,
elaboration: 2
Pencabulan hakcipta didefinisikan sebagai pelanggaran
marks.
hak yang dilindungi oleh Akta Hakcipta. Hakcipta ialah satu
set hak eksklusif yang mengawal penggunaan sesuatu Total = 3 marks)
pernyataan idea atau maklumat.

Infringement of copyright occur when you break the


copyright laws such as copying movie, software or CDs
illegally or selling pirated software.

Pencabulan hakcipta terjadi apabila undang-undang


hakcipta seperti menyalin filem, perisian atau cakera padat
secara tidak sah atau menjual perisian cetak rompak.

b. 1. Cyber Laws are made to ensure people follow the (State and
rules and laws. This is because individuals are more explain 1
controlled by their passion and education alone can't reason: 2
make them to be good, so laws were created to scare marks, 2
people in being 'good'. reasons and
explanation: 4
Undang-undang Siber dicipta untuk memastikan
marks. Total = 4
manusia mematuhi peraturan dan undang-undang. Ini
marks)
kerana seseorang individu itu lebih dipengaruhi oleh
kehendak ke atas sesuatu perkara dan pendidikan
sahaja tidak mampu mengawal mereka menjadi insan
yang baik.

2. To give protection against the misuse of computers


and computer criminal activities such as
unauthorised use of programmes, illegal transmission of
data or messages over computers, hacking and
cracking of computer systems and networks.
Untuk mengawal perlakuan jenayah dari segi
penyalahgunaan komputer seperti mengguna program
tanpa kebenaran, penghantaran data atau mesej
melalui komputer secara tidak sah, menggodam sistem
dan rangkaian komputer.

32.

a) i. Magnetic Medium floppy disk, hard disk


ii. Optical Medium CD, CD-ROM, DVD, DVD-R, DVD-RW

iii. Flash Memory Flash memory card, Flash memory sticks

b) Give two characteristics of Y.

RAM is usually volatile. Its contents are lost once the power is shut off.
RAM can be erased or written over at will by the computer software.

Y - RAM Z -ROM

Data and program is stores during and after Stored by the manufacturer
processing

Stores information temporarily Stores information permanently

Processing time is very fast, but uses a lot of Processing time is fast, but uses very little
power power

Volatile Non-volatile

Vous aimerez peut-être aussi