You are on page 1of 4

NAME : ___________________________________ CLASS :__________

UNIT PEPERIKSAAN DAN PENILAIAN


SMK PERMATA JAYA
RENGIT, JOHOR.

MONTHLY TEST (FEBRUARY) 2011


INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
FORM 4

TIME PERIOD: 9.50 – 10.50 AM (1 HOUR)

QUESTION 1 - Write the correct example for each blank below.

ADVANTAGES DISADVANTAGES
Effective sharing of information Social problems
• Information can be ___________________ • Individualistic and Introvert
__________________________________ • Identity theft
_ _______________________________. • Fraud
(1) • Pornography
• Exchange opinions, news and etc. through • _____________________________ (2)
email, discussion groups and many more • Online Gambling
channels.

Lower cost communication Health problems


• Internet is cost effective • ________________________ (3)
• Cheap connection • Eyestrain
• Physical and mental health

1
___________________ (4) of communication
• Information can be accessed and retrieved
anytime, anywhere.
• But GIGO applies (Garbage In, Garbage
Out)
Paperless environment
• Information can be stored and retrieved
from hard disk or CD - ROM (digital
medium)

____________________ (5) communication


• Anyone can be reach with the right
technologies

(10 Marks)
QUESTION 2 – Answers all the question below.

(1) Table 8 shows two situations for two types of computer crime.

A B
En. Romzi uses the power of En. Ahmad likes to download songs, music
electromagnetic energy to overload and movies from one of the commercial
computer circuitry. company through the Internet. He stores
them and sells to his friends.

Table 1

Based on Table 1, answer the following questions.

a) Explain the type of computer crime in situation A.

_____________________________________________________________________
_____________________________________________________________________

b) Explain the type of computer crime in situation B.


_____________________________________________________________________
_____________________________________________________________________
(4 Marks)

(2)

2
a) List TWO controversial content that stated in the statement.
_____________________________________________________________________
_____________________________________________________________________

b) State ONE impact of controversial content in society from the statement.


_____________________________________________________________________
_____________________________________________________________________

c) In your opinion, what will happen to Ahmad if he forwarded the email to his friends?
_____________________________________________________________________
_____________________________________________________________________
(6 Marks)

Question 3 - Write the correct example for each blank below

(Example of the __________ devices)

_______________ Device _______________ System

METHOD OF AUTHENTICATION

METHOD OF VERIFICATION

User ___________________ _______________ Object

3
(10 Marks)

LAW
STATEMENTS BREAKING/
UNETHICAL
1. Using the office computer to do personal things.
2. Sending a computer virus via e-mail.
3. Hacking into your school’s database to change your examination results.
4. Reading your friend’s e-mail without his or her permission.
5. Selling pirated software in a night market.
Plagiarising and using materials from the Internet for your class
6.
assignment without giving credit to the original author.
7. Using information without authorization.
8. Selling information to other parties without the owner’s permission.
9. Steal some important financial information of the rich individual via online.
Log in into bank account of some individual without permission with intend
10.
to steal the money.
Question 4 - Write the correct statement below whether LAW BREAKING or
UNETHICAL.

(10 Marks)

&&~~~~~~~~ GOOD LUCK ~~~~~~~~&&

You might also like