Documente Academic
Documente Profesional
Documente Cultură
DAERAH KERIAN
NAMA :
KELAS...
NO. KAD PENGENALAN
ANGKA GILIRAN
Question No.
No. Soalan
1.
2.
3.
i)
ii)
4.
5.
6.
7.
i)
ii)
8.
i)
ii)
9.
10.
i)
ii)
11.
i)
ii)
12.
13.
14.
i)
ii)
15.
i)
ii)
16.
17.
18.
19.
i)
ii)
20.
i)
ii)
21.
a)
b)
22.
23.
i)
ii)
24.
25.
Candidates Answer
Jawapan Calon
TRUE
B
TRUE
FALSE
C
DOCUMENTATION
A
Q
P
TRUE
TRUE
D
TRUE
TRUE
L
K
B
COPYRIGHT INFRINGEMENT
RELATION OPERATOR
LOGICAL OPERATOR
DateofBirth/NumofStudent
Date
WEB-BASED
TRUE
B
INTERPRETER
ASSEMBLER
STRING
DOUBLE
KP
UNIQUE or ANY RELEVENT ANSWER
D
P
Q
C
B
JUMLAH
Answer Sheet
Helaian
Marks
Markah
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
/36
SECTION B
26)
(i)
(a)
Copyright infringement
samson involves illegal copy or reproduction of copyrights material by the black
1M
market group
(ii)
1M
or
Samson downloads movie, proprietary software, MP3, MP4 songs and sell to his friend
illegally.
or
any related reason according to copyright infringement.
26.
(b)
1M
1M
Processor/CPU
1M
Control Unit
1M
2M
(ii)
27
(b)
1M
28.
(a) (i)
2M
2M
28) (b)
29.
(a) (i)
Scanne r
1M
Digital camera
1M
(ii)
29.
(b)
1M
1M
1M
Phase N: Coding
1M
ii)
(b)
i.
ii.
iii.
iv.
v.
SECTION C
QUESTION 31
(a)
OR
It is frequently used to protect network from unauthorised access.
Kebiasaannya digunakan untuk melindungi dari capaian tidak sah
[1 mark]
2. Human aspect
[1 mark]
to give self-awareness talk and motivate the employees to be honest, responsible and
trustworthy users.
Memberi ceramah kesedaran dan motivasi kepada pekerja supaya jujur, bertanggung
jawab dan menjadi pekerja yang boleh dipercayai.
[1 mark]
AND
to train employees to follow the rules and procedures of the organization
melatih pekerja supaya mematuhi peraturan dan juga prosedur.
[1 mark]
OR
to ensure that the computers and important data can only be accessed by authorised
personnel by using lock, password and smartcard
memastikan komputer dan data penting hanya boleh dicapai oleh kakitangan yang
diberikuasa dengan menggunakan kunci, katalaluan dan kad pintar.
[1 mark]
* can mix points from different security measures *
(b)
Dua jenis ancaman lain yang memudaratkan tapak web kerajaan
1. Malicious code
[1 mark]
Is any codes in any part of software that is intended to cause undesired effect, security
breaches or damage to a system
Iaitu sebarang kod di dalam perisian yang boleh menyebabkan kesan yang tidakdiingini,
memecahkan perisian keselamatan atau kerosakan sistem
[1 mark]
3. Theft
[1 mark]
Theft is the illegal taking of another persons property or information without that persons
freely given consent.
Mengambil harta/maklumat orang lain tanpa persetujuan empunya.
[1 mark]
QUESTION 32
Example:
ClassID
5 mark for 5
fields
Class Name
Student ID
Student Name
Address
New Record
Delete Record
[7 marks]
QUESTION 33
a( i )
X: Intranet
a( ii )
X
Provides
information for
organization
employees
Criteria
Types of users
High
Security
Telephone
directories,
internal job
openings,
employee
information
Usage
Y
Provides
information to
suppliers,
customers and
business
partner
Use Virtual
Private
Network (VPN)
technology to
communication
over the
internet more
secure
Acess data,
check status
place orders,
send email
It is used for public by provide information for public to access all kinds of
information generally.
b( i )
b( ii )