Sei sulla pagina 1di 19

Name :

Class : ..

CONFIDENTIAL
3765/1
ICT
Nov 2009
2 Hours

PEJABAT PELAJARAN DAERAH KUALA LANGAT

PEPERIKSAAN AKHIR TAHUN


TINGKATAN 4

INFORMATION AND COMMUNICATION TECHNOLOGY


3765/1
2 HOURS

READ THE INSTRUCTION CAREFULLY


1.

Section A consists of 25 questions. Answer ALL questions in answer sheet provided


at the end of the question paper.
2.
Section B consists of 5 questions. Answer ALL the questions.
3.
Section C consists of 3 questions. Answer two questions. Question 31 is compulsory
AND either Question 32 or Question 33.

This paper consists of 22 printed pages.


CONFIDENTIAL

3765/1

SULIT

Section A
Bahagian A
[36 marks]
[36 markah]
Answer all questions. Write your answer in the spaces provided in Answer Sheet. Each
answer carries one mark.
Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian
Jawapan. Setiap jawapan diperuntukkan satu markah.
1. Communication is an act of transmitting____________________
Komunikasi adalah satu tindakan untuk menukarkan________________
A. data
data
B. messages
pesanan
C. knowledge
pengetahuan
D. information
maklumat
2. Cyber law is defined as _____________________.
Undang-undang cyber bermaksud ___________________.
A. any laws relating to electronic and technology industry.
sebarang undang-undang yang berkait dengan industri elektronik dan teknologi
B. any laws relating to industry and the Internet communications.
sebarang undang-undang yang berkait dengan industri dan komunikasi internet
C. any laws relating to technology and the Internet communications.
sebarang undang-undang yang berkait dengan teknologi dan komunikasi internet
D. any laws relating to protecting the internet and other online communication
technology
sebarang undang-undang yang berkaitan dengan melindungi internet dan
teknologi komunikasi dalam talian
3. Which of the following is NOT the example of computer fraud?
Manakah antara berikut BUKAN contoh penipuan computer?
A. E-mail hoaxes
E-mel palsu
B. Programmed Fraud
Program Palsu
C. Investment Schemes by Internet
Skim Pelaburan melalui Internet
D. Diverts goods to the wrong destinations
Menghantar barangan ke destinasi lain

3765/1

SULIT

4. The most recent type of computer language would be


Bahasa komputer yang terbaru adalah ..
A machine language
bahasa mesin
B assembly language
bahasa himpunan
C third-generation language
bahasa generasi ketiga
D natural language
bahasa tabii
5. What are the benefits of Electronic Banking to bank customers?
Apakah kebaikan Electronic Banking kepada pengguna bank?
I

24-hour service
Perkhidmatan 24-jam
II Electronic Fund Transfer
Pemindahan Dana Elektronik
III Electronic Cash Deposits
Deposit Tunai Elektronik
IV Electronic Loan Application
Permohonan Pinjaman Elektronik
A.
B.
C.
D.

I,II and III


I,II and IV
I,III and IV
II, III and IV

6. Floppy disc, CD -ROM and flash drive are examples of ________________


Disket, CD-ROM dan pemacu kilat adalah contoh ______________
A Primary storage
Storan primer
B Secondary storage
Storan sekunder
C Tertiary Storage
Storan ketiga
D Additional Storage
Storan tambahan
7. Which of the following are output devices?
Yang manakah di antara berikut adalah peranti output?
I. Printer pencetak
II.
Monitor monitor
III. Joystick kayu ria
IV.
Plotter pemplot
V.
Microphone mikrofon
A.
B.
C.
D.

3765/1

I,II and III


I,II and IV
II,III and V
III, IV and V

SULIT

8. Which of the following are biometric devices?


Yang manakah di antara berikut merupakan peranti biometrik?
I.
II.
III.
IV.
A.
B.
C.
D.

Hand geometry
Callback System
Retinal Scanning
Signature Verification System
I, II and III
I, II and IV
I, III and IV
II, III and IV

9. Windows XP, Macintosh OS X, and Linux are examples of


Windows XP, Macintosh OS X, dan Linux adalah contoh-contoh bagi
A Application Software
Perisian Aplikasi
B Web Browser
Penggelintar Internet
C Operating Systems
Sistem Pengoperasian
D Shareware program
Program Kongsi
10. Name the network topology in Figure 1 below.
Namakan topologi rangkaian pada Rajah 1di bawah.

Figure 1
Rajah 1
A. Star
Bintang
B. Bus
Bas
C. Ring
Cincin
D. Mesh
Campuran

3765/1

SULIT

FIGURE 2
RAJAH 2
11. Figure 2 shows a cable that is used as a physical transmission medium in transmitting
electrical messages. The cable is a __________
Rajah 2 menunjukkan kabel yang digunakan sebagai medium penghantaran fizikal
dalam memindahkan mesej elektronik. Kabel itu adalah __________
A.
B.
C.
D.

Coaxial cable
Fibre Optic Cable
Shielded Twisted Pair
Unshielded Twisted Pair

12. Device A in Figure 3 refer to


Peranti A dalam Rajah 3 merujuk kepada

Device A

FIGURE 3
RAJAH 3
A.
B.
C.
D.

switch
modem
access point
network interface card

3765/1

SULIT

13. Table 1 shows the activities of computer crime.


Jadual 1 menunjukkan aktiviti jenayah komputer
P
Q
R
S

Computer Fraud
Komputer
Copyright Infringement
Pencabulan Hakcipta
Computer Theft
Kecurian Komputer
Computer Attack
Serangan Komputer
Table 1
Jadual 1

Based on Table 1 write P, Q, R or S for the following statement:


Berdasarkan Jadual 1 tuliskan P, Q, R atau S bagi pernyataan berikut:
i)

Ahmad received multiple advertisement hoaxes in his email account.


Ahmad menerima pelbagai iklan didalam akaun emailnya. : ___________S

ii) Abu transfer his company profit to his own account. : ___________R
Abu memindahkan keuntungan syarikat ke dalam akaun peribadinya
iii) Ali downloaded an assignment from the internet and claimed it is his. : _______Q
Ali memuat turun tugasan dari internet dan mendakwa kepunyaanya.
14. Figure 5 shows some examples of application software:
Rajah 5 menunjukkan sebahagian contoh perisian aplikasi

Based on Figure 5, match the correct application software to its purpose:


Berdasarkan Rajah 5, padankan perisian aplikasi yang bersesuaian
i)

creating letters and memos : ___________


membuat surat dan memo

ii) managing financial accounts : ___________


mengurus akaun kewangan
iii) presenting ideas to an audience: _________
persembahan maklumat kepada penonton

3765/1

SULIT

15. Choose your answers from the list below .


Pilih jawapan dari senarai yang diberikan dibawah.
Fingerprint Recognition
Pengecam CapJari

Voice recognition
Pengecam Suara

Iris Scanning
Pengimbas Iris

Hand Geometry Scanning


Pengimbas Geomatri Tangan

Figure 4 shows different methods of authentication.


Rajah 4 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.

i)

ii)

Figure 4
Rajah 4
Based on Figure 4, name the method used in
Berdasarkan Rajah 4, namakan kaedah yang digunakan dalam
i)__________________________
ii) __________________________

3765/1

SULIT

16. Figure 6 shows three types of cables which are used as physical transmission
medium.
Rajah 6 menunjukkan tiga jenis kabel yang digunakan sebagai media penghantaran
fizikal.

R
S

T
FIGURE 6
RAJAH 6
Based on Figure 6, write R, S or T for the following statements.
Berdasarkan Rajah 6, tulis R, S atau T bagi pernyataan berikut.
a)
This cable have two insulated copper wires that are twisted around
each other.
___________
Kabel ini mempunyai dua wayar bersalut kuprum yang terpiuh antara satu sama
lain.
b)

This cable consists of a single copper wire surrounded by at least three layers
___________
Kabel ini mengandungi satu wayar kuprum tunggal yang dikelilingi oleh
sekurang-kurangnya tiga lapisan.

17. Choose Figure R, S or T to match the following statements.


Pilih Rajah R, S atau T untuk memadankan kenyataan berikut.
.

a. This network consists of a single central cable to which all computers and devices
are connected. : _________________
Rangkaian ini terdiri daripada satu kabel tunggal yang menghubungkan semua
komputer dan peranti.
b. For this type of network, data travels from one computer to another computer in one
direction. : _________________
Bagi rangkaian jenis ini, data mengembara dari satu komputer ke komputer lain
dalam satu arah.

3765/1

SULIT

18. Below are the hardware needed while setting network facilities. Name them.
Di bawah adalah perkakasan yang diperlukan untuk penyediaan rangkaian. Namakan
perkakasan tersebut.
i)

Hardware
ii)

iii)

19. Fill in the blank with the correct answer.


Isikan tempat kosong dengan jawapan yang betul.
i)

Electromagnetic waves ranging in frequencies between 3 Kilo Hertz and 1 Giga


Hertz are normally called ________________________ . radio waves
Gelombang elektromagnetik yang julat frekuensinya di antara 3 Kilo Hertz dan1 Giga
Hertz selalunya dipanggil ________________________ ..

ii) Waves ranging in frequencies between 1 and 300 Giga Hertz are normally called
________________________. Microwaves
Gelombang yang julat frekuensinya di antara 1 dan 300 Giga Hertz selalunya
dipanggil ________________________ ..
iii) Remote control devices that we use to control our television or radio at home use
________________________ signals infrared
Alat kawalan jauh yang digunakan untuk mengawal tv dan radio di rumah
menggunakan isyarat________________________
Question 20 Question 25
Write True or False for the following statements :
Tuliskan Benar atau Palsu pada pernyataan berikut:
20) Computer system consists of three major hardware components; input devices, output
devices and processor.True
Sistem komputer terdiri daripada tiga komponen perkakasan yang utama iaitu peranti input,
peranti output dan pemproses.
21) WAN is a network connecting computers within very large areas, such as state,
countries and the world. False
WAN adalah rangkaian yang menghubungkan komputer di kawasan yang luas
seperti di antara negeri, negara dan dunia.
21) Bus Topology are easy to add or remove any nodes. True
Nod didalam Topologi bus adalah mudah untuk ditambah ataupun dibuang.

3765/1

SULIT

22) A network links two or more computers together to enable data and
resource exchange. True
Sebuah rangkaian menghubungkan dua atau lebih komputer untuk
membolehkan pertukaran data dan sumber.
23Intranet does not have its own firewall to protect from intruders outside an organisation
from accessing the company information or data. False
Intranet tidak menggunakan tembok api sendiri untuk melindungi dari pencerobohan orang
luar dari masuk dan mendapatkan maklumat atau data di dalam organisasi

a. All computers in peer-to-peer network have equal responsibilities and capabilities


to use the resources available on the network.
Semua komputer dalam rangkaian rakan-ke-rakan mempunyai tanggung jawab
dan keupayaan yang sama untuk menggunakan sumber dalam rangkaian.True
b.

3765/1

Extranet is a private network that uses internet technology to share information


with authorized parties.True
Ekstranet adalah rangkaian persendirian yang menggunakan teknologi Internet
untuk berkongsi maklumat dengan pihak yang dibenarkan.

SULIT

Answer Sheet
Name
IC No
Question
No.
1.
2.
3.
4.
5
6
7
8
9
10
11
12
13 i )
ii )
iii )
14 i)
ii)
15 i)
ii)
iii)
16 i)
ii)
17 i )
ii )
18 i)
ii)
iii)
19. i )
ii)
iii )
20
21
22
23
24
25

Form:
Candidates Answer

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
23
25
26
27
28
29
30
31
32
33
34
35
36
TOTAL MARKS

3765/1

Marks

SULIT

Section B
Bahagian B
[20 marks]
[20 markah]
This section consists of FIVE questions. You are required to answer all questions.
Bahagian ini mengandungi LIMA soalan. Anda dikehendaki menjawab semua soalan
tersebut.
1.

a)

Copyright infringement is defined as a violation of the rights secured by


Copyright Act.
Pelanggaran hakcipta bermaksud pencabulan ke atas hak-hak yang
dilindungi oleh Akta Hakcipta..
Give TWO examples of copyright infringement
Berikan DUA contoh pelanggaran hakcipta
i.

___________________________________________

ii. ___________________________________________

[2 marks]
[2 markah]

b) Based on the pictures below, name TWO biometric devices used for
authentication.
[2 marks]
Berdasarkan rajah di bawah, namakan DUA peranti biometrik yang
digunakan untuk tujuan pengesahan.
[2 markah]

i. ______________________

3765/1

ii. ______________________

SULIT

2.

a. Define computer theft and give an example of an activity that reflects


computer theft.
[2 marks]
Takrifkan pencurian komputer dan beri satu contoh aktiviti yang
\ menggambarkan pencurian komputer.
[2Markah]
________________________________________________________________________
________________________________________________________________________

b. Hacking is a source of threat to security in computer. Define hacking and


give an example of hacking activity.
[2 marks]
Pencerobohan adalah satu sumber ancaman kepada keselamatan komputer.
Takrifkan pencerobohan dan beri satu contoh aktiviti pencerobohan.
[2Markah]
________________________________________________________________________
________________________________________________________________________

3.

The diagram below show the network hardware requirement.


Diagram dibawah menunjukkan perkakasan rangkaian.

a)

State X and Y
Nyatakan X dan Y

[2marks]
[2 markah]

_______________________________________________________________

3765/1

SULIT

b)

Explain the function of X and Y


Terangkan fungsi X dan Y.

[2marks]
[2 markah]

_________________________________________________________________
_________________________________________________________________

4.

Figure 1 shows some of the components of a computer system.


Rajah 1 menunjukkan sebahagian komponen sistem komputer

SOFTWARE

DOS

WINDOWS

ANTI VIRUS

ANTI SPYWARE

Based on Figure 1,
Berdasarkan Rajah 1.
a)

State two differences of user interfaces applied for both software H.


[2 marks]
Nyatakan DUA perbezaan antaramuka pengguna yang digunakan untuk
kedua-dua perisian H.
[2 Markah]
_________________________________________________________________
_________________________________________________________________

b)

Identify software I. Name one type of software I and its function.


Kenalpasti perisian I. Namakan satu jenis perisian I dan nyatakan
fungsinya.

[2 marks]
[2 Markah]

_________________________________________________________________
_________________________________________________________________

3765/1

SULIT

5.

FIGURE 2 shows a network.


Rajah 2 menunjukkan sebuah rangkaian.

PC2

PC1

IP address: 192.168.1.5
Subnet mask: 255.255.253.0
Gateway: 192.168.1.1

IP address: 192.168.1.5
Subnet mask: 255.255.253.0
Gateway: 192.168.1.1

INTERNET
ADSL modem
IP address: 192.168.1.1
Subnet Mask: 255.255.255.0

FIGURE 2

Rajah 2
(a) Explain why PC1 and PC2 are not able to communicate with each other. [2 marks]
Jelaskan kenapa PC1 dan PC2 tidak boleh berkomunikasi antara
satu sama lain.
[2 Markah]
_________________________________________________________________
_________________________________________________________________

(b) Redraw the table below and write the configuration of network connection
for PC1 and PC2 so that both computers are able to communicate with each other.
[2 marks]
Lukiskan semula jadual dibawah dan tulis konfigurasi rangkaian untuk PC1 dan PC2
supaya kedua-dua komputer dapat berkomunikasi.
[2 Markah]
Computer
PC1
PC2

3765/1

IP address

SULIT

Subnet Mask

SECTION C
[ 14 MARKS ]
This section consist of three questions. You are required to answer two questions only:
(i)
(ii)

Question 33 is compulsory, and


Either Question 31 or Question 32

Question 31
Figure 1 shows the component of computer system

Figure 1
(a)

Based on Figure 1, draw the information processing cycle in block diagram


accordingly.
[2 marks]

________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
(b)

Explain two functions of component A

[2 marks]

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3765/1

SULIT

(c)

Differentiate between component B and component C

[2 marks]

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(d)

Give one example of component C other than shown in the figure 1

[1 mark]

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Question 32
Figure 2 shows computer network topologies.

Topology A

Topology B

Topology C

Figure 2

(a)

Based on the Figure 2, give the name of:


i.

Topology A : _____________________________________________

ii.

Topology B : _____________________________________________

iii.

Topology C : _____________________________________________
[3 marks]

3765/1

SULIT

(b)

Give two disadvantages of Topology B

[2 marks]

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(c)

Differentiate between Topology A and Topology C

[2 marks]

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Question 33
Figure 3 shows three computers with system software and application software.

MS DOS
Word star
Dbase
AVG Antivirus

Windows XP
Microsoft Excel
Norton Antivirus

Windows 98
Word 2000
Microsoft Access
Pc-cillin Antivirus

Figure 3
Y of application software
Computer
(a) Computer
Based X
on the figure 3, defineComputer
the meaning
and giveZ
one example.
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

3765/1

SULIT

(b)

State two (2) differences between system software and application software.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
[4 marks]

(c)

Why Computer X needs to install the AVG Antivirus Software?


_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
[1 mark]

3765/1

SULIT

Potrebbero piacerti anche