You are on page 1of 15

1.

) Read the following situation:

Baca situasi berikut:


Romli like to spends her free time surfing the internet. He always downloads film,
proprietary software , MP4, MP3 songs and sells them to his friends. He uses his ICT
skill to get the unauthorized password and serial code for the software. One day he
found that his computer screen display unusual message and imej and some file
become corrupted.
Romli selalu meluangkan masa lapangnya melayari Internet. Dia sering memuat
turun filem, perisian dan lagu untuk dijual kepada rakannya. Dia menggunakan
kepakaran ICTnya untuk mendapatkan no siri yang tidak sah bagi perisian yang
dimuat turun. Pada satu hari Romli mendapati komputernya memaparkan imej dan
mesej yang aneh dan beberapa fail pada komputer sudah rosak.
(a) (i) State the type of computer crime that Romli committed.
Nyata jenis jenayah komputer yang dilakukan oleh Romli.
(ii) Give a reason for your answer.

Beri satu alasan bagi jawapan anda.

[2 marks]

(b) What has happened to Romlis computer ? How to prevent his computer
from problems ?
Apa yang telah berlaku pada komputer Romli ? Bagaimanakah dapat
mengatasi masalah komputer tersebut?
[2 marks]

Component B

Component A

2) Figure 5 shows examples of components computer hardware. A computer system


needs to have this hardware to function.
Rajah 5, menunjukkan contoh-contoh perkakasankomputer. Sistem komputer
memerlukan perkakasan ini untuk berfungsi.

Component D

Component C
Figure 5
Rajah 5
Based on figure 5,
Berdasarkan Rajah 5,

Draw complete a computer hardware block diagram.


Lukis dengan lengkap gambarajah blok perkakasan komputer.

3) Based on Figure 6, answer the following questions.

[4 marks]

Berdasarkan Rajah 6, jawab soalan-soalan berikutnya.

X
X
Company TRK

Figure 6
Rajah 6

(a) Suggest a suitable device for X in Figure 6 and state its function.
Cadangkan peranti yang sesuai untuk X bagi Rajah 6 dan nyatakan
fungsinya. [2 marks]

(b) Explain the security measures to be taken by Company TRK to protect


data from being accessed by unauthorized users.
Terangkan langkah keselamatan yang perlu diambil oleh Syarikat TRK untuk
melindungi data daripada diakses oleh pengguna yang tidak sah. [2 marks]

4) Intan Syuhada, manager ICT Department of EduTech College is given the


responsibility to set up a computer laboratory with 20 PCs for the college. Intan
Syuhada was informed by the college that it is running on low budget for
software installations. As the manager of ICT Department, Intan Syuhada will
have to look for suitable software type and operating system to be used at the
college at minimal cost.
Intan Syuhada, pengurus Jabatan ICT EduTech College diberi tanggungjawab
untuk menubuhkan sebuah makmal komputer dengan 20 PC untuk kolej. Intan
Syuhada dimaklumkan oleh pihak kolej yang ia sedang berjalan pada bajet yang
rendah untuk pemasangan perisian. Sebagai pengurus Jabatan ICT, Intan
Syuhada perlu mengenalpasti jenis perisian dan sistem operasi yang bersesuaian
untuk digunakan di kolej pada kos yang minimum.

(a) (i) What type of software should Intan Syuhada choose? Justify your
answer. Apakah jenis perisian harus Intan Syuhada pilih? Jelaskan jawapan
anda [2 marks]
(ii) State one example operating system mentioned in (a)
Nyatakan satu contoh sistem operasi yang disebut dalam (a)

[1 mark]

(b) Describe two advantages of using software type mentioned in (a).


Jelaskan dua kelebihan menggunakan jenis perisian yang disebut dalam (a).
[4 marks]

Bank KITA intends to increase the level of security in some important bank,
using the latest information technology. Through new methods such as
fingerprint scanners, only authorized officer can walk into the area. You as the
head of the Information Technology asked to manage the implementation.
Bank KITA bercadang untuk meningkatkan tahap keselamatan di beberapa bilik
penting dalam bank tersebut,
dengan menggunakan kaedah teknologi
maklumat terkini. Melalui kaedah baru seperti pengimbas cap jari, hanya
pegawai yang telah diberi kebenaran sahaja boleh memasuki kawasan tersebut.
Anda sebagai ketua Unit Teknologi Maklumat diminta mengurus
pelaksanaannya.

(a) (i)

State and explain the authentication method used.


Nyatakan dan jelaskan kaedah pengesahan yang telah digunakan.
[3Marks]

(ii)

List 2 examples of the same method with the above underlined

statement Senaraikan 2 contoh kaedah yang sama dengan pernyataan


bergaris di atas.

[2 Marks]

(b) Explain why authentication step is very important ?


Jelaskan mengapa langkah pengesahan adalah sangat penting? [2 Marks]

6) Figure 2 shows information on two types of authentication methods.


Rajah 2 menunjukkan maklumat tentang dua jenis kaedah pembuktian.

Authentication
methods

fingerprint recognition
pengecaman ibu jari

taxi service booking


t
tempahan
perkhidmatan taxi

facial recognition
pengecaman muka

Figure 2
Rajah 2

Based on Figure 2, state the method of :


Berdasarkan Rajah 2, nyatakan kaedah :

(i)

(ii) Q

7) Figure 10 shows a sketch of a Computer Laboratory.

Rajah 10 menunjukkan lakaran sebuah makmal komputer.

Figure 10
Rajah 10

Based on Figure 10,


Berdasarkan Rajah 10,

a) Identify the topology used


Justify your answer.
Kenalpasti topologi yang digunakan.Berikan justifikasi anda..
[2 marks]

b) State two differences between the topology in (a) with the ring
topology.
Nyatakan dua perbezaan antara topologi di (a) dengan topologi
cincin.
[2
marks]

8) State the name of the first generation computer.


Nyatakan nama komputer generasi pertama. 1marks
9)

State whether the following statements is True or False.


Nyatakan sama ada pernyataan berikut Benar atau Palsu
(i)

Privacy means that we have the right not to disclose our

personal details.

Hak peribadi bermaksud kita ada hak untuk tidak

mendedahkan maklumat peribadi. 1marks


(ii)

E-banking makes buying and selling activities faster and


more efficient through internet.
Perbankan elektronik membolehkan aktiviti belian dan jualan
lebih cepat dan berkesan melalui internet. 1marks

10)

Complete the following statements by filling in the blanks:


Isikan ruang kosong untuk melengkapkan pernyataan berikut:

PC1
IP
address:
Alamat
IP :
192.168
.1.5

PC2
IP
address:
Figure 3 Alamat
IP :
Rajah 3
192.168.1
.6

Figure 3 shows a communication rules between two computers.


The protocol that sets the communication rules between these
computers to ensure the delivery of information packets is
____________.

Rajah 3 menunjukkan peraturan komunikasi antara dua komputer.


Protokol yang menyediakan peraturan komunikasi antara komputer
untuk memastikan penghantaran paket maklumat ialah
_______________.

11) Figure 8 shows two types of user interface of an operating system


(OS).
Rajah 8 menunjukkan dua jenis antaramuka sistem pengoperasian.

Interface X

Interface Y

Antaramuka

Antaramuka

Figure 8
Rajah 8

(a)

Name interface X and interface Y shown in Figure 8.

Namakan antaramuka X dan antaramuka Y yang ditunjukkan


dalam Rajah 8.
(b)

(2 marks)

Give one difference between interfaces X and Y.

Berikan satu perbezaan di antara antaramuka X dan


antaramuka Y.

(2 markah)

12) Statement 2 refers to misconduct activities.


Pernyataan 2 merujuk kepada aktiviti salahlaku.
Kadri likes to watch movie. He prefers to download the movies rather
than buy original CDs as his collection. Sometimes, he copies the
movies into CDs and sells them to his friends.

Kadri suka menonton filem. Dia lebih suka memuat turun filem dari
membeli filem yang asli untuk koleksi peribadi. Kadang kala dia
menyalin filem tersebut ke dalam CD dan menjual CD tersebut
kepada rakan-rakannya.

Statement 2
Pernyataan 2

Based on the above statement:


Berdasarkan pernyataan itu:

(a)

Explain briefly about the computer crime stated in the above


situation.
Terangkan secara ringkas jenayah komputer yang dinyatakan
di dalam situasi di atas.(3 marks)

(b)

Explain two reasons why we need to have cyber law in


computing.
Jelaskan dua sebab mengapa undang-undang siber perlu
dalam dunia pengkomputeran.
(4 marks)

13)
Situation 1

Your computer displays strange behavior. For instance, you discover


that assignment.doc
has suddenly been renamed to
assignment.exe.
Based on situation above;
Berdasarkan situasi di atas;

(i)

What do you think is the cause of this problem and determines the
appropriate measures to overcome this threat
Pada fikiran anda apakah penyebab kepada masalah ini dan
kenalpasti
kaedah yang sesuai untuk mengatasi ancaman ini.
[
2 marks]

Situation 2

Laila has to send a document file containing confidential information


by e-mail to her manager. One day, she found that the file had been
accessed by an unauthorized user.

(ii)

What do you think is the cause of this problem and determines the
appropriate measures to overcome the threat on Situation 2.
Pada fikiran anda apakah penyebab kepada masalah ini dan
kenalpasti
kaedah yang sesuai untuk mengatasi ancaman dalam Situasi 2.
[2
marks]
14

Primary Storage
Storan Primer

Secondary
Storage
Storan Sekunder

(i)

X
Y
State two differences between X and Y.
Nyatakan dua perbezaan di antara X dan Y.
[2

marks]

(ii)

Give another example of X and state a function.


Berikan contoh lain untuk X dan nyatakan satu fungsi.
[2

marks]

15 )Figure 11 shows a type of network communication technology X. X is used in


Melara
Company and its branches. Employees use X to access company information,
using
assigned userID and password.

Rajah 11 menunjukkan sejenis teknologi komunikasi rangkaian iaitu X. X


digunakan
di dalam Syarikat Melara dan cawangannya. Pekerja menggunakan X untuk
mencapai maklumat syarikat melalui IDpengguna dan kata laluan.

Figure 11
Rajah 11

Based on Figure 11,


Berdasarkan Rajah 11,

(i)

State the name of X and explain it briefly.


Nyatakan nama bagi X dan terangkan ia secara ringkas. [2 marks]

(ii)

Give two differences between X and the internet.


Berikan dua perbezaan antara X dan internet.

16) Figure 10 shows about the computer network communications.

[2 marks]

B
Figure 10

Based on Figure 10, give two differences between network A and network B [4 marks]

17) Give an examples of input and output devices. (2marks)

18) Figure 3 below shows a networking device

Figure 3

Identify the device in Figure 3.kenal pasti perkakasan di gambarajah 3 (1marks)

You might also like