Sei sulla pagina 1di 5

Question 1

a) What do you understand by the term plagiarism and its consequences if a student
are caught plagiarizing?

(4 marks)

b) Under certain circumstances, called fair use, it is legal to reproduce a copyrighted


work without the permission of the copyright holder. In the court of law there are
certain factors when considering fair use. Explain THREE (3) of these factors.

(6 marks)

c) Using an example of an online communication tool, briefly describe the benefits


of asynchronous communication tool.

(5 marks)

d) One of the most important issues in Web research is assessing the credibility,
validity and quality of the information provided on the Internet. What are the
opinions and considerations you emphasized before utilizing any Web resources?
Give your justification.
(10 marks)
Question 2

a) Melissa Khoo is currently employed as a web site designer and developer at a


local IT company in Petaling Jaya. Her job scope includes the design, layout and
coding of website. She is also actively involved with the technical and graphical
aspects of a website, which includes the maintenance and updating of an existing
website. One day, she was enrolled in the team to design and develop a Web site
of a new restaurant and catering operating in Shah Alam, Anna & Charlie
Restaurant and Catering.

Prior to the first meeting with the manager of Anna & Charlie Restaurant, she
should prepare appropriate questions as a guide in their initial meeting.

i. In your opinion, why it is necessary to prepare appropriate questions


before going for any initial client meetings.
(3 marks)
ii. Suggest TWO (2) theme colors for their restaurants and catering website,
and ONE (1) theme color they should avoid. Justify your suggestions.
(6 marks)

b) As a beginner/ new Web designer, it is important to learn and understand some


basic design principles. Understanding on the design principles will help you in
using appropriate visual media in web designing, thus producing a satisfying and
effective website.

i. Briefly explain FOUR (4) basic principles of website design.


(8 marks)
ii. In the web page anatomy, most web pages consist of 6 main components.
Please explain any of FOUR (4) components.
(8 marks)
Question 3

a) To create a HTML document, you can use Notepad++ to enter information about
the structure and the contents of a Web page. State the SIX (6) tags that you must
include in the HTML document prior to enter the contents of the Web page.
(3 marks)

b) Write a simple HTML code according to the following instructions:


i. Code to add a thumbnail image that links to a larger image, umskal.jpg with
width = 200 and height = 100.
(2 marks)
ii. Code to link external style sheet (CSS) file with HTML file where all styles
defined in mystyles10.css file.
(2 marks)
iii. Code to embed a video file from http://www.youtube.com/v/9hIQjrMHTv4
with width = 420 and height = 315.
(2 marks)
iv. Insert an Ordered List, using a format similar to the one shown to provide
information about top five local foods in Malaysia. Create a link to link all of
the listed local foods in figure 3.1 to one single food description page
(localfoods.html)
(6 marks)

Heading 1 Tahoma
& Center

Figure 3.1
v. Insert a short paragraph of contact information in Contact Us page as shown
in figure 3.2;

o Create an email link to customerservice@jalorah.com.my and add a text


link to the FAQ page at http://www.jalorah.com.my/FAQ
o Create a text link to the twitter page at http://www.twitter.com/JalorahMY
and facebook page at http://www.facebook.com/jalorahMalaysia
o Add a horizontal rule with width - 70%, height - 5 px and background
color navy
o Then, insert statement of 2015 Copyright Jalorah Malaysia in
centered position

(10 marks)

Heading 2

Figure 3.2
Question 4

a) Online auction allows consumer/customer to buy or bid on desired products and


services. Give TWO (2) examples of an online auction website and explain
THREE (3) advantages of using and conducting online auctions.
(7 marks)

b) In computer security, threat is a possible danger that might exploit a vulnerability,


thus leading to breach security as a consequence. This will cause harm. Discuss
FOUR (4) classes of threat in computer security with an example for each class of
threat.

(8 marks)

c) Threats to network and Web site security can originate both internally from within
the organization and externally from outsiders. Discuss TWO (2) types of internal
network security threats.
(10 marks)

Potrebbero piacerti anche