Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Class : ..
CONFIDENTIAL
3765/1
ICT
Nov 2009
2 Hours
3765/1
SULIT
Section A
Bahagian A
[36 marks]
[36 markah]
Answer all questions. Write your answer in the spaces provided in Answer Sheet. Each
answer carries one mark.
Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian
Jawapan. Setiap jawapan diperuntukkan satu markah.
1. Communication is an act of transmitting____________________
Komunikasi adalah satu tindakan untuk menukarkan________________
A. data
data
B. messages
pesanan
C. knowledge
pengetahuan
D. information
maklumat
2. Cyber law is defined as _____________________.
Undang-undang cyber bermaksud ___________________.
A. any laws relating to electronic and technology industry.
sebarang undang-undang yang berkait dengan industri elektronik dan teknologi
B. any laws relating to industry and the Internet communications.
sebarang undang-undang yang berkait dengan industri dan komunikasi internet
C. any laws relating to technology and the Internet communications.
sebarang undang-undang yang berkait dengan teknologi dan komunikasi internet
D. any laws relating to protecting the internet and other online communication
technology
sebarang undang-undang yang berkaitan dengan melindungi internet dan
teknologi komunikasi dalam talian
3. Which of the following is NOT the example of computer fraud?
Manakah antara berikut BUKAN contoh penipuan computer?
A. E-mail hoaxes
E-mel palsu
B. Programmed Fraud
Program Palsu
C. Investment Schemes by Internet
Skim Pelaburan melalui Internet
D. Diverts goods to the wrong destinations
Menghantar barangan ke destinasi lain
3765/1
SULIT
24-hour service
Perkhidmatan 24-jam
II Electronic Fund Transfer
Pemindahan Dana Elektronik
III Electronic Cash Deposits
Deposit Tunai Elektronik
IV Electronic Loan Application
Permohonan Pinjaman Elektronik
A.
B.
C.
D.
3765/1
SULIT
Hand geometry
Callback System
Retinal Scanning
Signature Verification System
I, II and III
I, II and IV
I, III and IV
II, III and IV
Figure 1
Rajah 1
A. Star
Bintang
B. Bus
Bas
C. Ring
Cincin
D. Mesh
Campuran
3765/1
SULIT
FIGURE 2
RAJAH 2
11. Figure 2 shows a cable that is used as a physical transmission medium in transmitting
electrical messages. The cable is a __________
Rajah 2 menunjukkan kabel yang digunakan sebagai medium penghantaran fizikal
dalam memindahkan mesej elektronik. Kabel itu adalah __________
A.
B.
C.
D.
Coaxial cable
Fibre Optic Cable
Shielded Twisted Pair
Unshielded Twisted Pair
Device A
FIGURE 3
RAJAH 3
A.
B.
C.
D.
switch
modem
access point
network interface card
3765/1
SULIT
Computer Fraud
Komputer
Copyright Infringement
Pencabulan Hakcipta
Computer Theft
Kecurian Komputer
Computer Attack
Serangan Komputer
Table 1
Jadual 1
ii) Abu transfer his company profit to his own account. : ___________R
Abu memindahkan keuntungan syarikat ke dalam akaun peribadinya
iii) Ali downloaded an assignment from the internet and claimed it is his. : _______Q
Ali memuat turun tugasan dari internet dan mendakwa kepunyaanya.
14. Figure 5 shows some examples of application software:
Rajah 5 menunjukkan sebahagian contoh perisian aplikasi
3765/1
SULIT
Voice recognition
Pengecam Suara
Iris Scanning
Pengimbas Iris
i)
ii)
Figure 4
Rajah 4
Based on Figure 4, name the method used in
Berdasarkan Rajah 4, namakan kaedah yang digunakan dalam
i)__________________________
ii) __________________________
3765/1
SULIT
16. Figure 6 shows three types of cables which are used as physical transmission
medium.
Rajah 6 menunjukkan tiga jenis kabel yang digunakan sebagai media penghantaran
fizikal.
R
S
T
FIGURE 6
RAJAH 6
Based on Figure 6, write R, S or T for the following statements.
Berdasarkan Rajah 6, tulis R, S atau T bagi pernyataan berikut.
a)
This cable have two insulated copper wires that are twisted around
each other.
___________
Kabel ini mempunyai dua wayar bersalut kuprum yang terpiuh antara satu sama
lain.
b)
This cable consists of a single copper wire surrounded by at least three layers
___________
Kabel ini mengandungi satu wayar kuprum tunggal yang dikelilingi oleh
sekurang-kurangnya tiga lapisan.
a. This network consists of a single central cable to which all computers and devices
are connected. : _________________
Rangkaian ini terdiri daripada satu kabel tunggal yang menghubungkan semua
komputer dan peranti.
b. For this type of network, data travels from one computer to another computer in one
direction. : _________________
Bagi rangkaian jenis ini, data mengembara dari satu komputer ke komputer lain
dalam satu arah.
3765/1
SULIT
18. Below are the hardware needed while setting network facilities. Name them.
Di bawah adalah perkakasan yang diperlukan untuk penyediaan rangkaian. Namakan
perkakasan tersebut.
i)
Hardware
ii)
iii)
ii) Waves ranging in frequencies between 1 and 300 Giga Hertz are normally called
________________________. Microwaves
Gelombang yang julat frekuensinya di antara 1 dan 300 Giga Hertz selalunya
dipanggil ________________________ ..
iii) Remote control devices that we use to control our television or radio at home use
________________________ signals infrared
Alat kawalan jauh yang digunakan untuk mengawal tv dan radio di rumah
menggunakan isyarat________________________
Question 20 Question 25
Write True or False for the following statements :
Tuliskan Benar atau Palsu pada pernyataan berikut:
20) Computer system consists of three major hardware components; input devices, output
devices and processor.True
Sistem komputer terdiri daripada tiga komponen perkakasan yang utama iaitu peranti input,
peranti output dan pemproses.
21) WAN is a network connecting computers within very large areas, such as state,
countries and the world. False
WAN adalah rangkaian yang menghubungkan komputer di kawasan yang luas
seperti di antara negeri, negara dan dunia.
21) Bus Topology are easy to add or remove any nodes. True
Nod didalam Topologi bus adalah mudah untuk ditambah ataupun dibuang.
3765/1
SULIT
22) A network links two or more computers together to enable data and
resource exchange. True
Sebuah rangkaian menghubungkan dua atau lebih komputer untuk
membolehkan pertukaran data dan sumber.
23Intranet does not have its own firewall to protect from intruders outside an organisation
from accessing the company information or data. False
Intranet tidak menggunakan tembok api sendiri untuk melindungi dari pencerobohan orang
luar dari masuk dan mendapatkan maklumat atau data di dalam organisasi
3765/1
SULIT
Answer Sheet
Name
IC No
Question
No.
1.
2.
3.
4.
5
6
7
8
9
10
11
12
13 i )
ii )
iii )
14 i)
ii)
15 i)
ii)
iii)
16 i)
ii)
17 i )
ii )
18 i)
ii)
iii)
19. i )
ii)
iii )
20
21
22
23
24
25
Form:
Candidates Answer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
23
25
26
27
28
29
30
31
32
33
34
35
36
TOTAL MARKS
3765/1
Marks
SULIT
Section B
Bahagian B
[20 marks]
[20 markah]
This section consists of FIVE questions. You are required to answer all questions.
Bahagian ini mengandungi LIMA soalan. Anda dikehendaki menjawab semua soalan
tersebut.
1.
a)
___________________________________________
ii. ___________________________________________
[2 marks]
[2 markah]
b) Based on the pictures below, name TWO biometric devices used for
authentication.
[2 marks]
Berdasarkan rajah di bawah, namakan DUA peranti biometrik yang
digunakan untuk tujuan pengesahan.
[2 markah]
i. ______________________
3765/1
ii. ______________________
SULIT
2.
3.
a)
State X and Y
Nyatakan X dan Y
[2marks]
[2 markah]
_______________________________________________________________
3765/1
SULIT
b)
[2marks]
[2 markah]
_________________________________________________________________
_________________________________________________________________
4.
SOFTWARE
DOS
WINDOWS
ANTI VIRUS
ANTI SPYWARE
Based on Figure 1,
Berdasarkan Rajah 1.
a)
b)
[2 marks]
[2 Markah]
_________________________________________________________________
_________________________________________________________________
3765/1
SULIT
5.
PC2
PC1
IP address: 192.168.1.5
Subnet mask: 255.255.253.0
Gateway: 192.168.1.1
IP address: 192.168.1.5
Subnet mask: 255.255.253.0
Gateway: 192.168.1.1
INTERNET
ADSL modem
IP address: 192.168.1.1
Subnet Mask: 255.255.255.0
FIGURE 2
Rajah 2
(a) Explain why PC1 and PC2 are not able to communicate with each other. [2 marks]
Jelaskan kenapa PC1 dan PC2 tidak boleh berkomunikasi antara
satu sama lain.
[2 Markah]
_________________________________________________________________
_________________________________________________________________
(b) Redraw the table below and write the configuration of network connection
for PC1 and PC2 so that both computers are able to communicate with each other.
[2 marks]
Lukiskan semula jadual dibawah dan tulis konfigurasi rangkaian untuk PC1 dan PC2
supaya kedua-dua komputer dapat berkomunikasi.
[2 Markah]
Computer
PC1
PC2
3765/1
IP address
SULIT
Subnet Mask
SECTION C
[ 14 MARKS ]
This section consist of three questions. You are required to answer two questions only:
(i)
(ii)
Question 31
Figure 1 shows the component of computer system
Figure 1
(a)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
(b)
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3765/1
SULIT
(c)
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(d)
[1 mark]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Question 32
Figure 2 shows computer network topologies.
Topology A
Topology B
Topology C
Figure 2
(a)
Topology A : _____________________________________________
ii.
Topology B : _____________________________________________
iii.
Topology C : _____________________________________________
[3 marks]
3765/1
SULIT
(b)
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(c)
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Question 33
Figure 3 shows three computers with system software and application software.
MS DOS
Word star
Dbase
AVG Antivirus
Windows XP
Microsoft Excel
Norton Antivirus
Windows 98
Word 2000
Microsoft Access
Pc-cillin Antivirus
Figure 3
Y of application software
Computer
(a) Computer
Based X
on the figure 3, defineComputer
the meaning
and giveZ
one example.
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3765/1
SULIT
(b)
State two (2) differences between system software and application software.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
[4 marks]
(c)
3765/1
SULIT