Documente Academic
Documente Profesional
Documente Cultură
Questions 1 - 10
For each of the questions, read the question first
and choose the best answer. Write A, B, C or D in
the spaces provided in Answer Sheet 1A.
1. Which of the following helps people
to protect privacy?
A. Use authentic software.
B. Use public computer.
C. Use pirated software.
D. Use shared program.
A. I and II
B. I, II and
III
B. two
iii) ROM chips hold the program and data that the
CPU is presently processing.
D. hundred
12.
i) Communication systems are electronic systems
that transmit data from one location to another.
ii) A computer program is a set of instructions that
directs computer to perform tasks.
iii) High Level Language is machine-dependent
and runs on one type of computer only.
6.
A.
B.
C.
Object-oriented programming
is a type of machine language
is a type of assembler language
converts source code into machine
code
D. allows you to interact with objects
when coding software
Theft
B.
C.
Hacking
TABLE 1
Maliciou
s code
D. Natural
disaster
i) Someone tries to access a computer or
network illegally.
ii) Floods and earthquakes can contribute to
computer systems destruction.
1
SET 1 ICT 07
14. Table 2 shows several application software.
Match the statement with the given
answers.
A. Spreadsheet
B. Presentation
TABLE 2
C. Word Processing
i)
18.
refers to rights of
individuals and companies to restrict collection
and use of information about them.
refers to any laws relating to protecting
the Internet and other online
communication technologies.
FIGURE 1
Ahmad gemar melayari internet. Pada suatu
hari,
semasa Ahmad sedang melayari internet, beliau
mendapati komputer beliau tidak laju seperti biasa.
Beliau juga mendapati bahawa LED pada modem
berkelip walaupun beliau tidak lagi melayari internet.
Komputer beliau juga reboot. Ahmad pasti terdapat
pengguna lain yang telah memasuki sistem komputernya.
RAJAH 1
Based on Figure 1, answer the following question:
Berdasarkan Rajah 1, jawab soalan-soalan berikut:
(a) State what kind of computer threat is mentioned
in the situation above?
Nyatakan jenis ancaman komputer
(1 mark)
yang disebutkan dalam situasi di
atas.
(b) Give ONE effect of the threat in (a) to Ahmads
data..
Berikan SATU kesan akibat ancaman yang di
(a) kepada data Ahmad
(1 mark)
(c) State TWO things that Ahmad can do to enhance
the security of his data while accessing the
Internet.
Nyatakan DUA perkara yang boleh dilakukan
oleh Ahmad untuk
meningkatkan lagi keselamatan data beliau s
emasa melayari internet.
i.
ii
(2 mark)
Ali works as a clerk in a school. He uses a keyboard
to key-in all the schools data into the computer. He
saves all the data as a backup in Device X. At the
end of every month, he will send a printed report to
the school principal.
Ali bekerja sebagai kerani di sebuah sekolah.
Ketika menggunakan komputer,beliau
menggunakan papan kekunci untuk memasukkan
semua data berkenaan sekolah tersebut . Beliau
membuat data sandaran ke dalam peranti X. Pada
setiap hujung bulan beliau akan menghantar
laporan bercetak kepada pengetua.
SET 1 ICT 07
Based on the situation given, answer the following
4.
question:
As a project
manager in EZ Creative Production Company, Ashraf has been assigned to develop a multimedia production to advertis
Berdasarkan situasi yang diberi, jawab soalan-soalan
berikut: projek di Syarikat EZ Creative, Ashraf ditugaskan untuk membangunkan produksi multimedia untuk mengiklankan
Sebagai pengurus
(a) Based on the situation above, name the input
device and output device that Ali used.
Berdasarkan situasi di atas, apakah peranti
inputdan peranti output yg digunakan oleh Ali.
i) Input device :
Peranti input :
ii) Output device:
Peranti output :
(b) Give two examples of Device X.
Berikan dua contoh peranti X.
(2 marks)
(2 mark)
(2 mark)
(2 marks)
3.
As a information technology coordinator in Samudera
Smart School, Samsun has been told to submit a
project paper on Digital Resource Center. The project
will be implemented in his school soon. The project
paper will show the phases and features in information
systems development. It will help his principal have the
overview of the whole project.
Sebagai penyelaras teknologi maklumat di Sekolah
Bestari Samudera, Samsun ditugaskan untuk
menghantar satu kertas kerja mengenai Pusat Sumber
Digital. Projek tersebut akan
dilaksanakan
di
sekolahnya dalam masa terdekat. Kertas kerja itu akan
menunjukan fasa-fasa dan fitur-fitur di dalam
pembangunan sistem pengurusan pusat tersebut. Hasil
penulisannya akan membantu pengetua sekolahnya
mendapat pandangan awal keseluruhan projek.
(b)
nt
not
Berdasarkan situasi yang diberi, jawab soalan-soalan
berikut:
(a)
Name second phase in developing the
project
above.
(1 mark)
Namakan fasa kedua dalam membangunkan
projek dinyatakan di
atas.
(b)
(c)
5.
(1 mark)
(1 mark)
SET 1 ICT 07
Based on the situation given, answer the following
question:
Berdasarkan situasi yang diberi, jawab soalansoalan berikut:
(a)
What is the problem statement for the
above situation?
Apakah pernyataan masalah bagi situasi di
a tas?
(1 mark)
(b)
(c)
(2 marks)
State phase X.
Nyatakan fasa X.
(1 mark)
SECTION C (14 MARKS)
BAHAGIAN C (14
MARKAH)
Answer Question 1.
Jawab Soalan 1.
(2 marks)
(c) Explain two differences between two
current network communications in the
bank.
Jelaskan dua perbezaan di antara dua
komunikasi rangkaian yang sedang digunakan di
bank sekarang.
(2 mark)
1.
Rajah 1
menunjukkan
rangkaian
(1 mark)
SET 1 ICT 07
2. Figure 2 shows five components that support
Salary Payment Information System (SPIS)
of Green Technology Company
Rajah 2 menunjukkan lima komponen yang
menyokong Sistem Maklumat Pembayaran
Gaji (SMPG) bagi Green Technology Company.
User
Pengguna
Hardware
Perisian
Data
Data
(2 mark)
(2 mark)
(2 mark)
_
_
SET 1 ICT 07
_
_
(2 mark)
(2 mark)
(1 mark)
END OF QUESTION
SOALAN TAMAT.
8. Computer Networks is a
.. A special set of rules
to connect devices
B system of interconnected computers and peripheral devices
C system that change analog signal to digital signal
D system that transmits information in form of data through a
physical medium
Question 1 to 10
1. Information refers to
A. An act of transmitting messages
B. the knowledge obtained from reading, investigation, study
or research.
C. the use of scientific knowledge, experience and resources
to create processes and products that fulfill human needs
D. the technology required for information processing, in
particular, the use of electronic computers,
communication devices and software applications to
convert, store, protect, process, transmit and retrieve
information from anywhere, anytime
.
B.Napiers Bone
D. Mechanical Calculator Machine
10.
4. Verification is
.
A.The act of proving or disproving the correctness of a system
with respect to a certain formal specification
B.Process where users verify that they are who they say they are
C.The scanning of retina and analysing the layer of blood vessels
at the back of the eye
D.The measurement and analysis of the shape of ones hand
11.
12.
13.
7. An operating system is
14.
15.
device.
C. storage
D. process
D. Intranet
Year
1
2
17.
(B)
In 1941, the
computer was
created.
SECTION B
QUESTION
1
Look at the picture below and answer the questions that follow.
18.
(C)
In 3500 BC, the
Sumerians
developed
cuneiform writing.
19.
In 1876, the first
telephone was
introduced.
(D)
Define pornography
(2 scores)
I.
20.
b.
QUESTION 2
Computer Security
biometrics
involves
of
retina
and
analyzing
the
at the back of the eye.
the
layer
a.
.
b.
of
QUESTION 3
1
3
( 4 scores )
b.
a.
QUESTION 4
I. Define computer
system
( 2 scores )
( 2 scores )
II. Draw a block diagram and describe the information processing
cycle which includes input, process, output and storage.
Question 1 (COMPULSORY)
An Audio-Visual Room has been equipped with 10 computers
and a hub. As an ICT coordinator, you are required to set up a
small network in the room. ( 2 scores)
a) Sketch the topology for the room.
b)
II.
III
BLOCK DIAGRAM
( 2 scores )
c)
Question 2
Figure 1 shows some of the components of a computer
system.
Figure
1
1
4
[2 scores]
Aspects
Secondary storage
I.
II.
[2 scores]
Question 3
Maria just won a set of personal computer. The personal computer
is without any system software.
1.
2.
[1
score]
a)
3.
[3 scores]
4.
[1 score]
b)
[2 scores]
1
5
1
6
18.
A.
Fetch
B.
19.
Execute
20.
C.
21.
D.
program FALSE
STATEMENT Retrieves the nextTRUE
Decode
instruction from the computers
22. An extranet is a private network
memory.that
uses Internet technology and the
Instruction:
Choose either True
or False.
public telecommunications
system.
23.
IV. sounds
Store
25. A server
needed in a peer-to-peer
Question
2 ( 4 ismarks)
Instruction:
network.
Label the diagram correctly
26.
27.
28.
RAM is non-volatile.
29.
30.
31.
A
gives authors and artists exclusive rights
to duplicate, publish or sell their materials.
33.
34.
A
includes any activities taken to disrupt the
equipment of computer systems, change processing control, or
corrupt stored data.
35.
36.
Turn
the PC
read instructions from BIOS.
Instructions in BIOS tell the computer how to access
the
Instructions in BIOS tell the computer for to find the
operating system.
Load the operating system to
(i) James uses an application software to ensure the file is virusfree before it is sent.
James menggunakan perisian applikasi untuk memastikan fail
itu bebas daripada virus sebelum dihantar.
(ii)Communication between James and Wong is text-based.
Komunikasi antara James dan Wong adalah berasaskan teks.
16
The pictures below show the types of user-interface.
Match the pictures with the correct name given.
Gambar berikut menunjukkan jenis-jenis antaramuka pengguna.
Padankan gambar dengan nama yang betul.
i
13
14
Table 1 shows several terms in a computer system.
Jadual 1 menunjukkan beberapa terminologi dalam sistem
komputer.
A
Input Device Peranti Input
B
Secondary Storage Device
Peranti Storan Sekunder
C
Command-Line User Interface
Antaramuka Arahan Baris
D
Word Processing Software
Perisian Pemproses Perkataan
TABLE 1
JADUAL 1
Based on Table 1, write A, B, C or D for the following question.
Berdasarkan Jadual, tuliskan A, B, C atau D untuk soalan
berikut.
(i) Ali wants to continue his assignment later. He wants to save
his assignment. What device should Ali use? Ali hendak
menyambung tugasannya kemudian. Dia hendak menyimpan
tugasannya.. Apakah peranti yang akan digunakan oleh Ali?
(ii)Shalini wants to create and manipulate documents containing
text and graphics. What type of program should Shalini use?
Shalini hendak menghasilkan dan manipulasi dokumen
mengandungi teks dan grafik. Program apakah yang patut
digunakan olehnya?
(iii) Type commands or press special keys on the keyboard to
enter data and instructions that instruct the operating system
what to do. It has to be typed one line at a time.
These statements refer to?Taip arahan atau tekan kekunci
khas untuk memasukkan data dan arahanyang akan
mengarahkan sistem pengoperasian. Ia perlu ditaip satu demi
satu baris pada satu masa. Pernyataan ini merujuk kepada?
Iii
15
Table 2 shows several terms of computer crime. Jadual 2
menunjukkan beberapa terminologi dalam jenayah computer.
Match the statements with the given answers.
Padankan pernyataan dengan jawapan yang diberi.
I
Ii
iii
TABLE 2 JADUAL 2
A Computer Crime
B
C
D
Jenayah
Komputer
Copyright
Infringement
Pelanggaran
Hak Cipta
Computer Attack
Pencerobohan
Komputer
Computer Theft
Pencurian
Komputer
Antaramuka Grafik
Command-Line
Arahan Baris
Menu-Driven
Perintah berasaskan menu
17
Antivirus is a
18
We transmit information or data by using two types of
signals, namely
and
.
Penghantaran maklumat dan data adalah dengan mengunakan
dua jenis isyarat iaitu
dan
.
20
means protecting our computer
systems and the information they contain against unwanted
access, damage, destruction or modification.
bermaksud menghalang sistem
computer dan maklumat daripada diceroboh, rosak atau
diubah suai.
21 An
is a set of program that
coordinates all the activities among the computer hardware
devices.
ialah satu set arahan yang
mengawal semua aktiviti di atara peranti-peranti computer.
22 A
is a system of interconnected
computers and peripheral devices.
ialah system yang
menghubungkan beberapa buah computer dan perantiperantinya.
23
makes use of graphics capabilities
of a computer to make the operating system and programs
easier to use, which is also called user-friendly.
menghasilkan kebolehan grafik
pada computer yang membolehkan system pengoperasian
mudah digunakan dan dikenali sebagai mesra pengguna.
24
is unsolicited e-mail messages,
advertisements or newsgroup postings sent to many recipients
at once.
ialah mesej e-mel yang tidak dikehendaki,
iklan atau kumpulan berita yang dihantar kepada ramai pada
satu- satu masa.
25
is a sequence of keystrokes and
instructions that are recorded and saved.
ialah turutan kekunci dan arahan yang
direkod dan disimpan.
SECTION B (20 MARKS)
BAHAGIAN B (20 MARKAH)
Answer all questions.Jawab semua soalan.
a. Name device C.
Namakan peranti C.
(2 marks)
SECTION C (14 MARKS)
BAHAGIAN C (14 MARKAH)
Answer Question 1.
Jawab Soalan 1.
1. Figure 4 shows the components and devices of a computer
system.Rajah 4 menunjukkan komponen dan peranti sistem
komputer.
(1 mark)
b. State the function of device C.
Nyatakan fungsi peranti C.
(1 mark)
c. Name 2 types of network in Figure 2.
Namakan 2 jenis rangkaian yang terdapat di Rajah 2
(2 marks)
5. Figure 3 refers to two different network topologies.
Rajah 3 menunjukkan 2 jenis topologi rangkaian yang berbeza.
b). Give one example of a device other than shown in Figure 4a.
Berikan satu contoh peranti selain daripada yang ditunjukkan
dalam rajah 4a .
(1 mark)
c). State two functions of the component in Figure 4c.
Nyatakan dua fungsi komponen dalam Rajah 4c.
(2 marks)
d). All the devices in Figure 4 are coordinated by an Operating
System. Explain two functions of the mentioned system.
Semua peranti dalam Rajah 4 dikoordinasi oleh Sistem
Pengendalian. Terangkan dua fungsi sistem tersebut.
a. Name :
Namakan
i) Topology A :
ii)Topology B :
(2 marks)
b. Name the network architecture for:
Namakan asas rekabentuk rangkaian bagi :
i) Topology A :
ii)Topology B :
(2 marks)
FIGURE 5
RAJAH 5
a). Name Phase P and Phase Q.
Namakan Fasa P dan Fasa Q.
(2 marks)
b). Arrange the phases in correct sequence.
Susun fasa tersebut mengikut urutan.
(1
mark) c). State two importance of Phase P in program
development process
Nyatakan 2 kepentingan fasa P dalam proses pembangunan
aturcara.
(2 marks)
d). Describe any translation method used in Phase Q.
Jelaskan mana-mana kaedah pelaksanaan aturcara
dalam Fasa Q.
(2 marks)
(2 marks)
d). What medium of delivery would you use to distribute your
presentation
to other schools in your state? Give your reason.
Apakah bentuk media penyampaian yang akan anda gunakan
untuk mengedarkan bahan persembahan anda kepada sekolahsekolah lain dalam negeri anda? Berikan alasan anda.
(2 marks)
KERTAS SOALAN TAMAT
A/An _
is the result of raw input
data that has been processed by the Central Processing
Unit into meaningful information.
A.input B.output C.Storage D.processor
3.
is
A.
10.
mouse
4.
_.
D.Data
I.
II.
13.
End
A.
B.
C.
D.
RM55.00
RM65.00
RM75.00
RM99.00
14.
a)
b)
15.
16.
D.Boolean
18.
a.One function of
is to store
program and data for later use. (Storage)
b. software helps computer to manage the computer
system. (Utilities)
26._
is one of the Internet
technologies that allow users to make telephone
calls using a broadband Internet connection.
27. Answer statements A and B according to
situation below.
a.
Operating systems that allow the network to
centralise functions and applications in one or more
dedicated file servers.
b.
Serves extended enterprise, including defined
sets of customers or suppliers or other partners.
_
28. _
_is the collection and
summarization of data and information. It includes
report, diagrams, programs, or any other
deliverables generated during the system
development cycle.
29. Multimedia elements consists of graphics, texts,
sounds, _ and _
30. The user interface principles applied in
designing multimedia project are Contrast,
Alignment,
, Proximity, Emphasis and Repetition.
SECTION B ( 20 marks) Answer all the question.
19.
( 4 marks )
Example
20.
21.
22.
23.
_
and retrieved through the digital medium instead of
paper.
[ True / False ]
_(2 marks)
(b)
Law
multimedia. 2 marks )
i
(b)
SECTION C
ii
ii
_
_
(b) State two types of Information Systems.( 2 marks )
_ ii_
_
Question 2 :
( 3 marks )
i.
ii.
__ iii
_
(b)
Figure 2
-----------------------------------------------------------------------------.
Question 3 :
Question 6
Figure 5 shows two different control structures used in
programming languages.
Figure 3
Base from the Figure 3 give 2 differences between Textbased editor and WYSIWYG editor.
_
__
_
__
Begin
Request mark
from program
Question 4 :
Mark >=50?
Print Dont
give up!
Print
Congratulations
Figure 4
Figure 4 desribe about medium of multimedia delivery.
Desribe 2 differences between cd-based and web-based
multimedia.
_
End
Structure A
Question 5 :
An Audio-Visual Room has been equipped with 10
computers and a hub. As an ICT coordinator, you are
required to set up a small network in the room.
a) Sketch the topology for the room.
[2 marks]
6.
Figure 2
Identify the network in Figure 2.
Network A
A Peer to peer
Client server
B Peer to peer
Network B
Peer
server
Peer
to
peer
Client
C Peer server
serve
Peer to
2.
The interface are difficult to use because they require exact spelling, grammar and punctuation.
peer Name the
interface.
D
A. Graphical user
interfaces
7. Haziq browsed http://webopedia.com to retrieve
B. B. Menu-driven
information
interfaces
7.
of networking. After that, he saves and prints
C. C. Command-line
the file of the document. Haziq intends to
interfaces
revisit to that web page.
D. D.All the above
.
3.A
is a small program that tells the operating system hoAwrratongceomthme
ufenaictuarteeswuistheda isnptehceificcodrreevcict es.equence.
A. Buffer
B.device
P004
Zikri Bin Zafri
14.10.1990
C. performance monitor D. driver
P003
Amirah Binti Zaid
15.11.1990
Table 1(b)
.
4. The following are examples of programming
languages.
Choose the correct pair.
Example
Generation
of
program
ming
A First
SQL Language
Second
Assembly
B Third
Language
Machine
Language
Fourth
C Language
C
D
.
Table 1(a) shows the records of a group of
students.
Table 1(b) is the result of rearranging the records in Table
1(a)
Student
Name of Student Date of
ID
Birth
P001
Syamin Binti Zaidi
13.10.1990
P002
Adriana Binti
12.10.1990
HamizanBinti Zaid
P003
Amirah
15.11.1990
P004
Zikri Bin Zafri
14.10.1990
Table 1(a)
Student
P002
P001
Name of Student
Adriana Binti
Hamizan
Syamin Binti Zaidi
Date of
12.10.1990
13.10.1990
8.
A.
10.
I
II
11.
14.
15.
Picture 1
Picture 2
Audio
Exit
Figure 3
identify the step :
A. Coding
B.
Documenting
C. Analyzing problemD. Developing a storyboard
12. Question 12 is based on Figure 4.
Unknown Idea
author
can be misunderstood
17.
(i)
(ii)
(i)
X is a (ii) The
hardware used to produce A is
18.
Syamin received a message from
Zaidi through Internet services S. Zaidi
asked Syamin to send the minutes of the
meeting using feature T of the same
services.
(i)
Name S
(ii) Name T
22.
Figure 9 shows the features of an Internet
browser.
Q
M
19.
Figure 7 and Figure 8 are two
methods of executing a program.
(i)
Source
code
Resu
Object
code
Figure
7
Dat
Source code
Y
Result
Da ta
(i)
Figure
8
Name X
(ii) Name Y
20.
Match the situation (i), (ii) and
(iii) with the most suitable software in
Table 2.
(ii)
21.
State one
23.
Alfi has listed a number of things to
complete a multimedia project entitled Visit
Malaysia Year 2007
as shown in Table 3.
1. Collect pictures of Malacca,
Putrajaya and Kuala Lumpur.
2. Orientate the Visit Malaysia Year
2007 logo so that it is animated.
3. Record the Cuti-Cuti Malaysia song.
4. Insert the Visit Malaysia themes;
insert Malacca, Putrajaya and Kuala
Lumpur history into different
screens.
Note : The files to be used are malacca.jpg,
putrajaya.bmp, logoVM.gif and CCM.wav.
(i)
What is the multimedia
element that is not used by
Azli?
(ii)
What is the name of the
animation file in Table 3?
(i)
Name feature Q.
(ii)
advantage of feature M
Table 2
During Parent Teacher Association
meeting, Haziq as the presiden
of the computer club has been
asked to give an annual report
on the clubs activities in a more
interesting and effective way.
Amira has a cousin studying
overseas. Instead of conversing
through the telephone, she can
use text through the Internet to
communication.
Question 21 is referring to situation below.
B This
student is
qualified
to receive
the
scholarshi
E. Input
on
students
qualificati
on
C. Output
on
students
qualificati
on
F.This
student is
not qualified
to receive
the
SECTION B
QUESTION
1
Look at the picture below and answer the questions
that follow.
I.
BEGIN
FALSE
(i)
_
TRUE
(ii)
(2 scores)
II. Give two impacts of pornography on
Malaysian society. a.
END
b.
D
fi
e
p
r
o
r
p
y
QUESTION 2
I.
Computer Security
(
I. Define compu2ter system
s
c
_o_
r
( 2 scores ) e
s
)
a.
b.
b.
(4 scores)
QUESTION 3
Rearrange the steps in scanning antivirus below.
A. scan the selected file
B. choose an antivirus program
C. wait while the program is scanning and
the result is produced
D. select file that need to be scanned
BLOCK DIAGRAM
( 2 scores )
( 4 scores )
QUESTION 5
Based on figure below, answer the following
questions.
I.
b.
(2 scores)
_
_ ( 2 scores )
a.
_
_
b.
( 2 scores )
GROUP A
GROUP B
i)
ii)
(i)
(ii)
Figure 14
Situation
Encik Kevin is the manager of Sona
Car Enterprise. He asks you to develop
a system to calculate the
monthly installment for every potential
customer.
When his customer decides to buy a car,
he will get the customers details and
fill it in a form. The problem is, he have to
calculate the monthly installment
manually.
_
ii) Identify the necessary output En. Kevin sees
in his manual system
(1 score)
_
_
input.
(2 scores)
3.
a) The following text is a statement.
En.AlidevelopedEmployee
Information System (EIS) for his client, Saujana Holding. He used
software
that couldcreate
without writing long
database programs.
He trained a data
entry clerk to enter data into EIS.
C. I, III, and IV
12.What is a bit?
A. A bit is the largest unit of information.
B. A bit is the biggest unit of information.
C. A bit is the longest unit of information.
D. A bit is the smallest unit of information.
.
II. DVD drives
IV. floppy disk drives
B. I, II, and IV
D. I, II, III, and IV
3. Output devices
.
A. are used for data storage
B. act as the brain of the computer
C. shows people the processed data or information
D. accept data or commands in a form that the computer can
use
bytes.
D. 218
local area
network ( LAN
)
network
star
SECTION B : 30 MARKS
cable
Computerised
Aspect
Task
Time
Interesting
Productivity
Profit
Non-computerised
QUESTION 2.
a) Define computer
system
( 4 marks)
c) Name device A as shown
in the
( 2 marks )
b) State
the
meanin
g of
input,
process
or,
output
and
storage.
( 2 marks)
d) Name the most suitable network cable that could avoid the
interference of electromagnetic signal in
Figure above.
( 2 marks)
( 4 marks )
c) Draw a block diagram and describe the information
processing cycle which includes input, process,
output and storage.
SECTION C : 10 MARKS
Answer ALL questions in the answer sheet provided.
QUESTION 1 (:10 MARKS)
You are to in charge of the computer systems of a company.
What do you know about the computer security system?
a)
BLOCK DIAGRAM
( 4 marks )
QUESTION 3.
Figure below shown three types of network topologies.
a) Name the network topology in the box below.( 2 marks)