You are on page 1of 4

JABATAN PELAJARAN NEGERI TERENGGANU ___________________________________________

PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA 2010

3765/1

INFORMATION AND COMMUNICATION TECHNOLOGY

SKEMA JAWAPAN

3765/1 2010 Hak Cipta Jabatan Pelajaran Negeri Terengganu

Answer Sheet

Question No. No. Soalan 1 2 3 4 5 i ii 6 7 i ii iii 8 9 10 11 12 13 14 15 16 17 18 19 20 i ii iii 21 i ii iii 22 i ii iii 23 24 25 i ii

Candidate's Answer Jawapan Calon Second A D A TRUE / BENAR TRUE / BENAR Hertz TRUE / BENAR TRUE / BENAR TRUE / BENAR B A TRUE / BENAR TRUE / BENAR Star C A Ping 10.5.25.1 Multimedia B Video Graphics / Grafik Icon / Ikon C TRUE / BENAR FALSE / PALSU TRUE / BENAR A C B X Y Z DBMS C File

Marks Markah 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36

i ii

Section B
26. a) b) 27. a). A: LAN b). CRITERIA Cost Network size Speed Transmission media type Number of computers LAN Low small fastest Twisted-pair Smallest WAN Higher Largest Slowest Fiber optic, radio wave and sattelite Largest B: WAN processes raw data and turns it into useful information i) LCD projector/ Monitor/ DLP projector ii) speaker/ headphone/ earphone/ woofer

28.

(a) (b)

Text based editor. Example : Notepad/ PS Pad/ Notepad ++ Name: WYSIWYG 1 mark i) WYSIWYG provide an editing interface that shows how the pages will be displayed in a web browser. ii) Editor does not require any HTML knowledge iii) It is easier for an average computer user. *either 1 1 mark

29.

a).

i) P : Documentation Phase ii) Q : Coding Phase

b)

1. 2. 3.

Documentation enables new programmer to understand the flow of the program. For future reference in case the program needs changes. Guide for the users

*either 2 2 marks 30.: a) b) Implementation Testing Phase , test the database objects functionality - test the system functionality 2 marks

Section C:
31 a) i. Unethical [1] - He uses the text without permission / - He uses someone elses work in his own [1] Unlawful [1] - The author of the text can sue him / - The text is protected under law [1]

ii.

b)

cyberlaw [1] - a law that protects online material / activities [1] - it prevents cyber criminals [1]

32. a P is intranet Q is extranet R is internet b P (Intranet) Privet network Network size smaller Security control laver higher 33. a) CUSTOMER Customer Name License No Driver Age Phone Payment Type [1 mark] b) SERVICE License No Rent Date R (Internet) Public network Largest network Security control laver lower

[1 mark]

Return Date Vehicle Type Pick Up Location Drop Off Location [1 mark]

[1 mark]

[1 mark]

[2 mark]

You might also like