Professional Documents
Culture Documents
ADVANTAGES DISADVANTAGES
Effective sharing of information Social problems
• Information can be ___________________ • Individualistic and Introvert
__________________________________ • Identity theft
_ _______________________________. • Fraud
(1) • Pornography
• Exchange opinions, news and etc. through • _____________________________ (2)
email, discussion groups and many more • Online Gambling
channels.
1
___________________ (4) of communication
• Information can be accessed and retrieved
anytime, anywhere.
• But GIGO applies (Garbage In, Garbage
Out)
Paperless environment
• Information can be stored and retrieved
from hard disk or CD - ROM (digital
medium)
(10 Marks)
QUESTION 2 – Answers all the question below.
(1) Table 8 shows two situations for two types of computer crime.
A B
En. Romzi uses the power of En. Ahmad likes to download songs, music
electromagnetic energy to overload and movies from one of the commercial
computer circuitry. company through the Internet. He stores
them and sells to his friends.
Table 1
_____________________________________________________________________
_____________________________________________________________________
(2)
2
a) List TWO controversial content that stated in the statement.
_____________________________________________________________________
_____________________________________________________________________
c) In your opinion, what will happen to Ahmad if he forwarded the email to his friends?
_____________________________________________________________________
_____________________________________________________________________
(6 Marks)
METHOD OF AUTHENTICATION
METHOD OF VERIFICATION
3
(10 Marks)
LAW
STATEMENTS BREAKING/
UNETHICAL
1. Using the office computer to do personal things.
2. Sending a computer virus via e-mail.
3. Hacking into your school’s database to change your examination results.
4. Reading your friend’s e-mail without his or her permission.
5. Selling pirated software in a night market.
Plagiarising and using materials from the Internet for your class
6.
assignment without giving credit to the original author.
7. Using information without authorization.
8. Selling information to other parties without the owner’s permission.
9. Steal some important financial information of the rich individual via online.
Log in into bank account of some individual without permission with intend
10.
to steal the money.
Question 4 - Write the correct statement below whether LAW BREAKING or
UNETHICAL.
(10 Marks)