Professional Documents
Culture Documents
(INTRODUCTION OF ICT)
NAMA
TINGKATAN :
4..
1.1
(SPM
sppangsess@gmail.com ( http://rmmict.blogspot.com )
2.
the
Figure 1 / Rajah 1
3..
4.
(Kedah 2013)
(A)
(B)
Figure 1 / Rajah 1
Which of the following is true? / Antara berikut, yang manakah benar?
sppangsess@gmail.com ( http://rmmict.blogspot.com )
A
B
C
D
6.
(A)
First Generation
Generasi Pertama
Second Generation
Generasi Kedua
Third Generation
Generasi Ketiga
Third Generation
Generasi Ketiga
(B)
Fourth Generation
Generasi Keempat
First Generation
Generasi Pertama
Second Generation
Generasi Kedua
Fourth Generation
Generasi Keempat
Figure 1 / Rajah 1
Based on Figure
sppangsess@gmail.com ( http://rmmict.blogspot.com )
2.
Figure 1 / Rajah 1
Based on Figure 1, state positive impacts of ICT on society
Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat
I.
Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjmatkan masa dan
sumber
II.
Inappropriate online communication with unknown person through the Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet
III.
Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
IV.
Effective sharing slander and false contents
Perkongsian fitnah dan penipuan kandungan yang efektif
A. I and II
B. I and III
C. II and IV
D. III and IV
1.1.2.2 State the differences between computerised and non-computerised systems.
SECTION B
1.
Figure 6 shows a situation in a banking system. /
Rajah 6 menunjukkan situasi di dalam sistem bank.
(Kedah
2012)
System A
Figure 6 / Rajah 6
System B
Sistem B
sppangsess@gmail.com ( http://rmmict.blogspot.com )
(PERAK 2011)
Statement 1 / Penyataan 1
Statement 1 refer to the use of ICT in ... sector.
Penyataan 1 merujuk kepada penggunaan ICT dalam sector
2.
3.
(P.Pinang 2012)
sppangsess@gmail.com ( http://rmmict.blogspot.com )
Figure 1/ Rajah 1
Based on Figure 1,
state one positive
impact of ICT on
society
Berdasarkan Rajah 1,
nyatakan kesan positif ICT
kepada masyarakat
I.
II.
III.
IV.
A.
Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjimatkan masa dan
sumber
Inappropriate online communication with unknown person through the Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet
Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
Effective sharing slander and false content
Perkongsian fitnah dan penipuan kandungan yang efektif
I and II
B.
I and III
C.
II and IV
D.
III and IV
SECTION B
1.
Based on figure 1, state a difference between the education before ICT and education
with ICT .
Merujuk kepada rajah 1, nyatakan perbezaan antara pendidikan tanpa ICT dan
pendidikan berbantukan ICT.
(PERAK 2011)
[2 markah]
b.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
7
2.
[2 markah]
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy,
Computer Crime and Cyber Law.
SECTION A
1.
(SPM
2011)
X
Moral guidelines for computer users.
Garis panduan moral untuk pengguna komputer.
2.
Y
Rules for computer users.
Peraturan-peraturan untuk pengguna
komputer.
No penalty or punishment.
Penalties or punishments imposed.
Tiada penalti atau hukuman.
Penalti atau htLkuman dikenakan.
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i)
X
(ii)
Y
Table 1 below shows computer ethics. Based on table, select A, B, C or D for the
following statements
Jadual 1 di bawah menunjukkan etika komputer. Berdasarkan jadual, pilih A, B, C atau D
untuk pernyataan-pernyataan berikut.
(Kelantan 2013 set 3)
Computer
Computer
Code of
Code of Crime
Ethics
Crime
Ethics
A
B
C
D
Table 1 / Jadual 1
a.
Is a system of moral standard or moral values used as a guideline for computer
user
Adalah sistem standard moral atau nilai moral digunakan sebagai panduan
untuk pengguna computer.
.
b.
Is guidelines in ICT that help determine whether a specific computer action
ethical
or unethical.
Satu panduan dalam ICT yang membantu bagi menentukan sesuatu computer
action beretika atau tidak.
SECTION B
1.
Figure 6 shows an application in a smartphone.
Rajah 6 menunjukkan satu aplikasi dalam telefon pintar.
(Terengganu 2013)
sppangsess@gmail.com ( http://rmmict.blogspot.com )
Figure 6 / Rajah 6
Based on Figure 6, / Berdasarkan Rajah 6,
Give two impacts of using this application to society.
Justify your answer.
Berikan dua kesan penggunaan aplikasi ini terhadap masyarakat.
Justifikasikan jawapan anda.
[4 markah][4 marks]
...................................................................................................................................
...................................................................................................................................
...................................................................................................................................
...................................................................................................................................
...................................................................................................................................
1.2.1.2 Differentiate between ethics and law.
SECTION A
1.
2.
SECTION B
1.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
Ali has been appointed by his teacher to help other teachers to key in the
test score into school HC3 Examination Program. Without his teacher
knowledge he had changed his ICTs subject marks from 40% to 75%. As a
result of the actions he has successfully passed the subject.
Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan
markah peperiksaan ke Program Peperiksaan HC3 sekolahnya.
Tanpa
pengetahuan gurunya beliau telah mengubah markah subjek ICTnya dari
40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan
cemerlang subjek tersebut.
Statement 2/ Pernyataan 2
Based on Statement 2,
Berdasarkan Pernyataan 2,
(a)
What is the type of misconduct based on the underlined phase above?
Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di
atas?
[2 marks][2 markah]
.
..
(b)
Explain the negative impact done by Ali towards the school.
Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.
[2 marks][2 markah]
.
..
1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION A
1.
(Kelantan
2013
Set 1)
Privacy means that we have the right not to disclose our personal details.
Kebersendirian bermaksud kita mempunyai hak untuk tidak mendedahkan maklumat
peribadi.
2.
The right of individuals and companies to deny or restrict the collection and use of data
and information about them refers to _________________.
Hak individu dan syarikat-syarikat untuk menafikan atau menyekat pengumpulan dan
penggunaan data dan maklumat tentang mereka merujuk kepada _________________ .
Terengganu 2013
..............................
SECTION B
1.
(SPM 2007)
10
Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) .
ii) .
iii) .
iv) ..
Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti
biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i)
State the name of the device. / Nyatakan nama
peranti itu.
(ii)
State the function of the device / Nyatakan fungsi
peranti itu.
2.
(SPM 2012)
Authentication methods
Kaedah pengesahan
11
3.
4.
A.
Callback system
Sistem panggilan
C.
Identification card
Kad pengenalan
B.
D.
Iris scanning
Imbasan iris
Voice recognition
Pengecam suara
Figure 2/Rajah 2
State the authentication method used in
Figure 2.
Nyatakan kaedah pengesahan yang
digunakan dalam Rajah 2
.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
12
5.
SECTION C
1.
Bank KITA intends to increase the level of security in some important bank, using the
latest information technology. Through new methods such as fingerprint scanners, only
authorized officer can walk into the area. You as the head of the Information Technology
asked to manage the implementation.
Bank KITA bercadang untuk meningkatkan tahap keselamatan di beberapa bilik penting
dalam bank tersebut, dengan menggunakan kaedah teknologi maklumat terkini. Melalui
kaedah baru seperti pengimbas cap jari, hanya pegawai yang telah diberi kebenaran
sahaja boleh memasuki kawasan tersebut. Anda sebagai ketua Unit Teknologi Maklumat
diminta mengurus pelaksanaannya.
(Kelantan 2013 Set 3)
(a) (i)
(ii)
List 2 examples of the same method with the above underlined statement
Senaraikan 2 contoh kaedah yang sama dengan pernyataan bergaris di atas.
[2 Marks]
[2 Marks]
13
Statement 2
X
X
X Rated
Rated Video
Video
Do
Do not
not enter
enter
(ii)
Y
sppangsess@gmail.com ( http://rmmict.blogspot.com )
14
[2 marks][2 markah]
1.2.3.2 Describe the process of filtering to control access to controversial contents
SECTION A
1.
Figure 2 shows part of an algorithm for a web page filter.
Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
(SPM 2009)
Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..
2.
FILTERING SETTINGS
(SPM 2012)
Restricted List
http://www.seperti.com
http://www.jalan.com
START
User access
/ Rajah
ADD Figure 2 REMOV
a 2web page
Based on Figure 2 , state the
E method used
EXIT
3.
YES
Contained
NO
banned
Figure 1 shows the keyword blocking
process
Rajah 1 menunjukkan proses penapisan
words? kata kunci
B
(SPM 2013)
C
sppangsess@gmail.com ( http://rmmict.blogspot.com )
STOP
15
Figure 1 / Rajah 1
Based on figure 1 write A,B or C to match the following statement
Berdasarkan rajah 1, tuliskan A,B atau C untuk dipadankan dengan pernyataan berikut
i.
Page download stops
Muat turun laman berhenti
ii.
Search for banned words
Mencari perkataan-perkataan yang diharamkan
4. Table 1 shows the method of an Internet filtering.
Jadual 1 menunjukkan kaedah penapisan Internet. (Kelantan 2013 Set 5)
X
uses a list of banned words to block the page
menggunakan senarai perkataan
terlaran untuk
halang laman
Y
use software to list the web sites and
block the page
menggunakan perisian untuk
senaraikan laman web dan halang
laman
Table 1/Jadual 1
Based on Table 1, state the name of : / Berdasarkan Jadual 1, nyatakan nama :
(i)
(ii)
5.
X
.........................................
Y
.........................................
State whether the following statements are True or False
Nyatakan sama ada pernyataan berikut Benar atau Palsu
(i)
Keyword blocking uses a list of banned words or objectionable terms to block the
Page completely./Sekatan kata kunci menggunakan senarai halangan perkataan
atau bantahan terma untuk menghalangnya secara lengkap....................
(ii)
Site blocking can be done by setting the browser to only accept pages with
certain level of ratings./Sekatan laman boleh dilakukan dengan menyediakan
pelayar hanya untuk menerima lamandengan aras tertentu...................
sppangsess@gmail.com ( http://rmmict.blogspot.com )
16
(Terengganu 2013)
SECTION B
1.
Figure 13 shows controversial contents on society
Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.
(Pahang 2013)
X
X
X Rated
Rated Video
Video
Do
Do not
not enter
enter
Based on figure 13, Z shows methods that can be used to prevent access to certain
materials on the internet. Describe one of the methods used.
Berdasarkan rajah 13, Z menunjukkan kaedah-kaedah yang digunakan untuk
menghalang capaian kepada kandungan internet yang tertentu.
Jelaskan satu kaedah yang digunakannya.
..
..
[2 marks][2markah]
SECTION C
1.
En. Aaron is a schools ICT Coordinator. He has found some students were entering the
ICT lab without permission and surfing pornography websites. Due to the incident, he
plans to use the web filtering as shown in the Figure 10.
En. Aaron merupakan Penyelaras ICT sekolah. Beliau mendapati beberapa orang pelajar
telah masuk ke makmal ICT tanpa kebenaran dan melayari beberapa laman web porno.
Lantaran itu, beliau bercadang menggunakan kaedah penapisan laman web seperti
dalam Rajah 10.
(Kedah 2013)
sppangsess@gmail.com ( http://rmmict.blogspot.com )
17
(a)
Figure 11 / Rajah 11
Based on the Figure 11; / Berdasarkan Rajah 11;
(i)
(ii)
(b)
[1 mark]/[1 markah]
sppangsess@gmail.com ( http://rmmict.blogspot.com )
18
II
III
IV
A
C
SECTION B
1.
b.
Who has committed in computer crime? State the type of computer crime he/she
has committed. Justify you answer. [ 2 marks ]
Siapakah yang telah melakukan kesalahan jenayah komputer? Nyatakan jenis
jenayah komputer yang telah dilakukan. Berikan alasan anda.
SECTION C
1.
Dewi works as an editor in one of the larger private television broadcasting in Malaysia.
She uses her expertise in ICT for editing the television programs in order to preserve the
quality before they were broadcast by the television station. Without companys
permission
Dewi has made copies of the television programs and sells it via Internet.
Dewi bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen
swasta yang terbesar di Malaysia. Dewi menggunakan kepakarannya dalam bidang ICT
untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Dewi turut
membuat
salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di
Internet
Based on the text:
Berdasarkan teks itu:
(a)
State the computer crime that has been done by Dewi.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
19
Nyatakan jenayah komputer yang telah dilakukan oleh Dewi.
...
[1 mark][1 markah]
(b)
Explain why cyber laws are important for television station broadcasting.
Terangkan mengapa undang-undang siber adalah penting untuk stesen
penyiaran televisyen.
..
..
..
..
[2 mark][2 markah]
(c)
Explain TWO ways from the human aspects to prevent the above crime
Terangkan DUA cara dari aspek kemanusiaan untuk mencegah jenayah di atas
..
..
..
..
[4 mark][4 markah]
2.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
20
Rajah 3 menunjukkan keterangan tentang ancaman komputer.
(Pahang 2013)
Computer program
that perform
unauthorised
processes on a
computer or a network
Program komputer
yang melaksanakan
proses-proses yang
tidak dibenarkan pada
suatu komputer atau
suatu rangkaian
Computer is used to
steal money, goods,
information or resources
Unauthorised
access to a
computer system
or network
Komputer digunakan
untuk mencuri wang,
barangan, maklumat
atau sumber.
Figure 3/Rajah 3 Q
Malicious Code
(ii)
Hacking
.
SECTION B
1.
Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer
(SPM 2011)
Figure 12 /
Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a)
State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
skrin komputer.
[2 markah]
State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.
[2 markah]
Read the following warning
Baca amaran berikut
(SPM 2013)
(b)
2.
21
b.
2 markah
i.
What precaution should you take if you cannot follow the given warning?
Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak
dapat mematuhi amaran yang diberi?
1 markah
ii.
1 markah
SECTION C
1.
Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
(a)
Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
i.
.
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi
ancaman itu.
ii.
i.
(b)
Describe two reasons why the computer may have been affected by the threat in
(a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
sppangsess@gmail.com ( http://rmmict.blogspot.com )
22
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human
aspects
SECTION A
1.
Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)
Plaintext
Encrypt
Decrypt
Plaintext
Name H : / Namakan H :
2.
Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak
mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus
(i)
1
Take necessary action /Ambil tindakan yang perlu
(ii) ..
Scan the selected area /Imbas kawasan yang dipilih
(iii)
3
Select area to be scanned /Pilih kawasan yang akan diimbas
(iv) ..
Table 2 /Jadual 2
(ii)
(iv)
3.
out
Ali has send a confidential file to Sandra using email. Rearrange the activities carried
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semula
aktiviti yang dijalankan oleh Ali mengikut urutan yang betul.
(SPM 2013)
P
Decrypt file
Menyahsulit file
Q
Open file received to view contents
Buka fail yang diterima untuk melihat kandungan
R
Select file to send
Pilih fail yang akan dihantar
S
Encrypt file
Enkripsi fail
T
Attach file to email
Kepilkan fail pada email
4.
TWINKLE company seeks your advice to protect their network resources from outsides
and to restrict employees access to sensitive data such as payroll or personal records.
Syarikat TWINKLE meminta nasihat anda bagi melindungi sumber rangkaian dari pihak
luar dan menyekat pekerja dari mencapai data yang penting seperti gaji dan rekod
peribadi.
What procedure you would suggest to them.
Apakah prosedur yang anda boleh cadangkan kepada mereka. (Kelantan 2013 Set 1)
sppangsess@gmail.com ( http://rmmict.blogspot.com )
23
A. Antivirus / Antivirus
C. Data backup / Sandaran data
5.
Azman Company seeks your advice to protect their network resources from outsider and
to restrict employees access to sensitive data such as payroll or personal records. What
procedures you would suggest to them.
Syarikat Azman meminta nasihat anda untuk melindungi sumber rangkaian dari
pencerobohan luar dan menghalang pekerja daripada mencapai data yang sulit seperti
pembayaran gaji dan rekod individu. Apakah prosedur yang anda perlu cadangkan
kepada mereka.
(Pahang 2013)
A.
Antivirus
B.
Anti-spyware
C.
Data backup
D.
Firewall
6.
Figure 1(a) and Figure 1(b) show the
problems faced when surfing the internet.
Rajah 1(a) dan Rajah 1(b)
menunjukkan masalah yang dihadapi
semasa melayari internet.
FIREWALL
ANTIVIRUS
ANTISPYWARE
Based on Figure 1(a) and Figure 1(b), match the problems above according to the
correct
sppangsess@gmail.com ( http://rmmict.blogspot.com )
24
security measures:
Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan langkah
keselamatan yang betul:
(i) Figure 1(a) .
Rajah 1(a)
(ii) Figure 1(b) .
Rajah 1(b)
7.
Q
Table 1 / Jadual 1
R
(Terengganu 2013)
Based on Table 1, match the correct security measures to overcome the problem below
by writing P, Q or R.
Berdasarkan Jadual 1, padankan langkah-langkah keselamatan bagi mengatasi masalah
di bawah dengan menulis P, Q atau R.
(i)
Identify and remove any computer viruses found.
Mengenalpasti dan membuang sebarang virus komputer yang ditemui.
................
(ii)
SECTION B
1.
As a new secretary of ICT Club, Nelly wanted to copy the club members
list from the computer in ICT room to her laptop using thumb drive.
While opening the file, suddenly she saw a pop up message as shown in
Figure 13.
Sebagai setiausaha Kelab ICT yang baru, Nelly mahu menyalin senarai
nama ahli kelab dari komputer di bilik ICT ke komputer ribanya dengan
menggunakan thumb drivenya. Semasa membuka fail tersebut, tibatiba dia melihat mesej pop-up seperti yang ditunjukkan dalam Rajah
13.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
25
Figure 13
Rajah 13
(a)
(b)
(i)
(iii)
(i)
(ii)
Based on b (i), give one example of utility software that can be use.
Berdasarkan b (i), berikan satu contoh perisian utiliti yang boleh
sppangsess@gmail.com ( http://rmmict.blogspot.com )
26
SEMAKAN
Tarikh
Tanda tangan
Guru
Catatan
sppangsess@gmail.com ( http://rmmict.blogspot.com )
27
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography
Firewall Data backup Human aspects
sppangsess@gmail.com ( http://rmmict.blogspot.com )