Académique Documents
Professionnel Documents
Culture Documents
PERATURAN PEMARKAHAN
FORM 4
3765/1
A. First generation
B. Second generation
C. Third generation
D. Fourth generation
I. 24 hours service
II. Electronic Fund Transfer
III. Electronic Cash Deposits
IV. Electronic Loan Application
A I and III
B I and IV
C I, II, and IV
D I, III, and IV
TRUE and FALSE Questions
5. Through the Internet, communication with anyone and anywhere in the world is possible. TRUE
6. Respecting ownership is the principles governing the affairs of a
community and is enforced by a political authority.
FALSE
State the differences between ETHICS and LAW. Fill in the box with the correct answer.
7.
LAW
a) Depends on country and state where the crime is committed.
8. All books have All rights reserved clearly printed. This statement means that the book is
subject to the ______COPYRIGHTS_____law. The shape of a handicraft and a composition of
batik pattern can be protected under the_____DESIGNS__right.
Question 9
recipients at once.
12. Below are the examples on how to control the access to controversial content:
I. Install antivirus
II. Referred to by URLs
III. Use filtering software
IV. Rate the content of websites
A. I and II
B. I, II and IV
C. II, III and IV
D. All at the above.
13. Which is the correct example of the Malaysian Cyber Law?
Question 14
2. Two companies work together to sell their clients information to other parties COMPUTER THEFT
6. Send a malicious computer code to all people around the world for fun. COMPUTER ATTACK
8. Modify certain parts of an article that resulted in misleading information on the Internet.
COMPUTER FRAUD
10. Change some graphics from the Internet and sell them to interested buyers. COPYRIGHT
INFRINGEMENT
28 m =22m
Question 15
16. Once the infected file is opened or executed, the _________ could then copy itself into
A. virus
B. hacker
C. Trojan horse
D. malicious code
17. Most ________ programs also protects against worms and Trojan horses.
A. firewall
B. antivirus
C. antispyware
D. data backup
A. CPU
B. RAM
C. input devices
D. output devices
I. input
II. output
III. storage
IV. process
A. I and II
B. I, II, and III
C. I, III, and IV
D. I, II, III, and IV
A. 8 bits
B. 1 Megabyte
C. 1 Terabyte
D. 1 Gigabyte
A. 1.0 Hz
B. 0.1 Hz
C. 1.0 GHz
D. 0.1 GHz
22. What is the main reason for using ASCII?
A B
Name A and B
Namakan A dan B
a) A: VIDEOCAM b) B: MICROPHONE
A. ports / port
A. TRUE
B. FALSE
26.
(a) U : secondary storage and its function is to hold data permanent. (2 marks)
Volatile hold data only temporarily Non-Volatile - hold data only permanent
(2 marks)
27.
a) X : decoding
Y : Storing (2 marks)
b) X: To translate the program instructions into signal that computer can execute.
(2 marks)
28.
(2 marks)
b) i. Customer can make any transaction at 24 hour services centre or via online.
v. Paperless environment.
29.
a) X: Keyword blocking
b) X : The method uses a list of banned word or objects terms. If found, it will blocked
Y : The method use software to list the website that will be blocked by using
software.
(2 marks)
30.
a)
Virus virus is the program that can pass on the malicious code to
other program by modifying them. It attaches itself to the
program usually files with .doc, .xls and .exe
Worm A program that copies itself and spread through the network.
i. Anti-virus
ii. Anti-spyware
iii. Firewall
v. Crytography
vi. Password
(2 marks)
SECTION C
31.
b. 1. Cyber Laws are made to ensure people follow the (State and
rules and laws. This is because individuals are more explain 1
controlled by their passion and education alone can't reason: 2
make them to be good, so laws were created to scare marks, 2
people in being 'good'. reasons and
explanation: 4
Undang-undang Siber dicipta untuk memastikan
marks. Total = 4
manusia mematuhi peraturan dan undang-undang. Ini
marks)
kerana seseorang individu itu lebih dipengaruhi oleh
kehendak ke atas sesuatu perkara dan pendidikan
sahaja tidak mampu mengawal mereka menjadi insan
yang baik.
32.
RAM is usually volatile. Its contents are lost once the power is shut off.
RAM can be erased or written over at will by the computer software.
Y - RAM Z -ROM
Data and program is stores during and after Stored by the manufacturer
processing
Processing time is very fast, but uses a lot of Processing time is fast, but uses very little
power power
Volatile Non-volatile