You are on page 1of 27

1

Soalan-Soalan Berdasarkan Subtopik


( Soalan Percubaan ICT SPM Negeri-negeri 2013 dan Soalan SPM Sebenar 2008-2013)

SMK RAJA MUDA MUSA


BESTARI JAYA SELANGOR

(INTRODUCTION OF ICT)

NAMA

TINGKATAN :

4..

1.1

Introduction to Information Technology


1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT.
1.1.1.2
Describe the brief evolution of computers.
SECTION A
1.
State the name of the first generation computer.
Nyatakan nama komputer generasi pertama
2008)

(SPM

sppangsess@gmail.com ( http://rmmict.blogspot.com )

2.

Figure 1 shows three technologies used in the generations of computers


Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
(SPM 2010)
Based on Figure 1, write A, B or C to match
following:
Berdasarkan Rajah l, tulis A, B atau C
untuk dipadankan dengan berikut:
(i)
Second Generation /
Generasi Kedua
...................
(ii)
Third Generation /
Generasi Ketiga
.

the

Figure 1 / Rajah 1
3..

Complete the following statement: / Lengkapkan pernyataan berikut.


Information
and
Communication
Technology
is
the
use
of
computers,
( i) ...........................devices and( ii) ......;:......................applications for processing,
storing, retrieving, protecting and transmitting information from anywhere at anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i)
......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan ,
mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat
pada bila-bila masa.
(SPM 2010)

4.

The following are features for one generation of computer.


Berikut merupakan ciri-ciri satu generasi komputer.

(Kedah 2013)

Vacuum tube technology / Teknologi vakum tiub


Huge size / Bersaiz besar

State the generation of the computer.


Nyatakan generasi komputer tersebut
..
5.

Figure 1 show the technologies used in two different generations of computers.


Rajah 1 menunjukkan teknologi yang digunakan dalam dua generasi komputer yang
berbeza.
(Kelantan 2013 Set 1)

(A)

(B)
Figure 1 / Rajah 1
Which of the following is true? / Antara berikut, yang manakah benar?

sppangsess@gmail.com ( http://rmmict.blogspot.com )

A
B
C
D

6.

(A)
First Generation
Generasi Pertama
Second Generation
Generasi Kedua
Third Generation
Generasi Ketiga
Third Generation
Generasi Ketiga

(B)
Fourth Generation
Generasi Keempat
First Generation
Generasi Pertama
Second Generation
Generasi Kedua
Fourth Generation
Generasi Keempat

Figure 1 shows the technologies used in the evolution of computers :


Rajah 1 menunjukkan teknologi yang digunakan dalam evolusi komputer.
(Pahang 2013)

Figure 1 / Rajah 1
Based on Figure

1 state the name of component.


Berdasarkan Rajah 1, nyatakan nama komponen.
(i)
X
.
(ii)
Y
.
7.
Which technology was used to replace vacuum tubes?
Teknologi manakah yang digunakan untuk menggantikan tiub hampagas?
(Terengganu 2013)
A
Transistors/Transistor
B
Microprocessor/Pemproses mikro
C
Integrated circuit/Litar bersepadu
D
Artificial intelligence/Kepintaran buatan

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce


1.1.2.1 List the usage of ICT in everyday life.
SECTION A
1.
Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are
examples of ICT usage in _______________ sector.
(Kelantan 2013 set 3)
ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit
wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICT
dalam bidang _______________.

sppangsess@gmail.com ( http://rmmict.blogspot.com )

2.

ICT has bring many positive impacts on society.


ICT membawa banyak kesan positif terhadap masyarakat. (Kelantan 2013 set 5)

Figure 1 / Rajah 1
Based on Figure 1, state positive impacts of ICT on society
Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat
I.
Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjmatkan masa dan
sumber
II.
Inappropriate online communication with unknown person through the Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet
III.
Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
IV.
Effective sharing slander and false contents
Perkongsian fitnah dan penipuan kandungan yang efektif
A. I and II
B. I and III
C. II and IV
D. III and IV
1.1.2.2 State the differences between computerised and non-computerised systems.
SECTION B
1.
Figure 6 shows a situation in a banking system. /
Rajah 6 menunjukkan situasi di dalam sistem bank.
(Kedah
2012)

System A

Figure 6 / Rajah 6

Based on Figure 6:/Berdasarkan Rajah 6:

System B

Sistem B
sppangsess@gmail.com ( http://rmmict.blogspot.com )

State the difference between system A and system B.


Nyatakan perbezaan di antara sistem A dan sistem B.
[2 marks][2 markah]

1.1.2.3 State the impact of ICT on society.


SECTION A
1.

Statement 1 is regarding to the use of ICT in everyday life.

(PERAK 2011)

All transactions are done by computers


Semua traksaksi dilakukan DENGAN komputer
Transaction can be done anytime and anyplace
Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana
Example of transactions is electronic funds transfer
Contoh transaksi adalah pemindahan wang elektronik

Statement 1 / Penyataan 1
Statement 1 refer to the use of ICT in ... sector.
Penyataan 1 merujuk kepada penggunaan ICT dalam sector
2.

Write the correct words to complete the following statement:


( KEDAH 2011)
Tulis perkataan yang betul untuk melengkapkan pernyataan berikut:
Information and Communication Technology enables information to be stored and
retrieved through digital medium instead of printed materials. This creates a/an
(i) ............................... environment. Communication technology that uses the Internet
provides (ii) ................................
communication since it is not restricted by
geographical and political boundaries.
Teknologi Maklumat dan Komunikasi membolehkan maklumat disimpan dan dicapai
melalui media digital dan bukan bahan bercetak. Perkara ini mewujudkan persekitaran
(i) .............................. . Teknologi komunikasi yang menggunakan Internet menyediakan
komunikasi (ii) ................................... boleh dilakukan tanpa batasan geografi dan
politik.

3.

Which of these is an impact of slander towards society?


Yang manakah kesan kepada fitnah terhadap masyarakat?

(P.Pinang 2012)

A Closer relationship / Hubungan lebih rapat


B Trust among people / Kepercayaan di antara manusia
C Higher moral behaviour / Perlakuan moral lebih tinggi.
D Bad reputation of people / Reputasi buruk pada seseorang.
4.

ICT has brought many positive impacts on society.


ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)

sppangsess@gmail.com ( http://rmmict.blogspot.com )

Figure 1/ Rajah 1

Based on Figure 1,
state one positive
impact of ICT on
society
Berdasarkan Rajah 1,
nyatakan kesan positif ICT
kepada masyarakat
I.
II.
III.
IV.
A.

Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjimatkan masa dan
sumber
Inappropriate online communication with unknown person through the Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet
Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
Effective sharing slander and false content
Perkongsian fitnah dan penipuan kandungan yang efektif
I and II

B.

I and III

C.

II and IV

D.

III and IV

SECTION B
1.
Based on figure 1, state a difference between the education before ICT and education
with ICT .
Merujuk kepada rajah 1, nyatakan perbezaan antara pendidikan tanpa ICT dan
pendidikan berbantukan ICT.
(PERAK 2011)

education before ict


Pembelajaran sebelum menggunakan ICT
a.
EDUCATION BEFORE ICT /
PEMBELAJARAN SEBELUM
MENGGUNAKAN ICT

education with ict


Pembelajaran menggunakan ICT
EDUCATION WITH ICT /
PEMBELAJARAN MENGGUNAKAN ICT

[2 markah]
b.

List TWO sectors that uses ICT in daily life.


Senaraikan dua sektor yang menggunakan ICT di dalam kehidupan seharian.
1

sppangsess@gmail.com ( http://rmmict.blogspot.com )

7
2.
[2 markah]
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy,
Computer Crime and Cyber Law.
SECTION A
1.

Table 1 shows the characteristics of X and Y in computer usage guideline.


Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan
komputer.

(SPM

2011)
X
Moral guidelines for computer users.
Garis panduan moral untuk pengguna komputer.

2.

Y
Rules for computer users.
Peraturan-peraturan untuk pengguna
komputer.
No penalty or punishment.
Penalties or punishments imposed.
Tiada penalti atau hukuman.
Penalti atau htLkuman dikenakan.
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i)
X

(ii)
Y

Table 1 below shows computer ethics. Based on table, select A, B, C or D for the
following statements
Jadual 1 di bawah menunjukkan etika komputer. Berdasarkan jadual, pilih A, B, C atau D
untuk pernyataan-pernyataan berikut.
(Kelantan 2013 set 3)
Computer
Computer
Code of
Code of Crime
Ethics
Crime
Ethics
A
B
C
D
Table 1 / Jadual 1
a.
Is a system of moral standard or moral values used as a guideline for computer
user
Adalah sistem standard moral atau nilai moral digunakan sebagai panduan
untuk pengguna computer.
.
b.
Is guidelines in ICT that help determine whether a specific computer action
ethical
or unethical.
Satu panduan dalam ICT yang membantu bagi menentukan sesuatu computer
action beretika atau tidak.

SECTION B
1.
Figure 6 shows an application in a smartphone.
Rajah 6 menunjukkan satu aplikasi dalam telefon pintar.

(Terengganu 2013)

sppangsess@gmail.com ( http://rmmict.blogspot.com )

Figure 6 / Rajah 6
Based on Figure 6, / Berdasarkan Rajah 6,
Give two impacts of using this application to society.
Justify your answer.
Berikan dua kesan penggunaan aplikasi ini terhadap masyarakat.
Justifikasikan jawapan anda.

[4 markah][4 marks]
...................................................................................................................................
...................................................................................................................................
...................................................................................................................................
...................................................................................................................................
...................................................................................................................................
1.2.1.2 Differentiate between ethics and law.
SECTION A
1.

State whether the following statements is True or False.


Nyatakan sama ada pernyataan berikut Benar atau Palsu. (Kelantan 2013 Set 1)
Both ethics and law are made as a rule to control computer users.
Etika dan undang-undang diwujudkan sebagai peraturan untuk mengawal pengguna
komputer.

2.

State whether the following statement is True or False.


Nyatakan sama ada peryataan berikut Benar atau Palsu. (Kelantan 2013 Set 5)
We need computer ethics and laws to prevent users from misusing the computer.
Computer
laws are universal, can be applied anywhere, all over the world.
Kita memerlukan etika dan undang-undang komputer untuk menghalang pengguna dari
menyalahgunakan komputer. Undang-undang komputer bersifat sejagat, boleh digunakan
dimana-mana negara di dunia.

SECTION B
1.

Statement 2 is about computer ethics.


Pernyataan 2 tentang etika computer.

(AMPANGAN SEREMBAN 2013)

sppangsess@gmail.com ( http://rmmict.blogspot.com )

Ali has been appointed by his teacher to help other teachers to key in the
test score into school HC3 Examination Program. Without his teacher
knowledge he had changed his ICTs subject marks from 40% to 75%. As a
result of the actions he has successfully passed the subject.
Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan
markah peperiksaan ke Program Peperiksaan HC3 sekolahnya.
Tanpa
pengetahuan gurunya beliau telah mengubah markah subjek ICTnya dari
40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan
cemerlang subjek tersebut.
Statement 2/ Pernyataan 2
Based on Statement 2,
Berdasarkan Pernyataan 2,
(a)
What is the type of misconduct based on the underlined phase above?
Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di
atas?
[2 marks][2 markah]
.
..
(b)
Explain the negative impact done by Ali towards the school.
Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.
[2 marks][2 markah]
.
..
1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION A
1.

State whether the following statements is True or False.


Nyatakan sama ada pernyataan berikut Benar atau Palsu.

(Kelantan

2013

Set 1)
Privacy means that we have the right not to disclose our personal details.
Kebersendirian bermaksud kita mempunyai hak untuk tidak mendedahkan maklumat
peribadi.
2.

The right of individuals and companies to deny or restrict the collection and use of data
and information about them refers to _________________.
Hak individu dan syarikat-syarikat untuk menafikan atau menyekat pengumpulan dan
penggunaan data dan maklumat tentang mereka merujuk kepada _________________ .
Terengganu 2013
..............................

SECTION B
1.

The following is a statement on information privacy.


Pernyataan berikut berkaitan keperibadian maklumat

(SPM 2007)

Information privacy refers to the right of individuals and organisations to


sppangsess@gmail.com
( http://rmmict.blogspot.com
)
deny or restrict the collection
and use the information
about them
Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk
menafi atau mengelakkan hasil dan maklumat mereka digunakan.

10

Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) .
ii) .
iii) .
iv) ..

1.2.2.2 State authentication and verification methods/technologies.


SECTION A
1.

Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti
biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i)
State the name of the device. / Nyatakan nama
peranti itu.

(ii)
State the function of the device / Nyatakan fungsi
peranti itu.

2.

Figure 1 shows information on two types of authentuication methods.


Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan

(SPM 2012)

Authentication methods
Kaedah pengesahan

Taxi services booking /


- Retinal scanning /
tempahan perkhidmatan
pengimbasan retina
teksi
- voice recognition /
Purchase using credit card /
Pengecaman suara
sppangsess@gmail.com ( http://rmmict.blogspot.com )
pembelian menggunakan
kad kredit

11

Based on figure 1 , state the name of / berdasarkan rajah 1, namakan


i. P ..
ii.
Q .

3.

4.

Which of the following is the example of verification method?


Antara berikut yang manakah merupakan contoh kaedah pengesahan?
(Kelantan 2013 Set )

A.

Callback system
Sistem panggilan

C.

Identification card
Kad pengenalan

B.

D.

Iris scanning
Imbasan iris

Voice recognition
Pengecam suara

Figure 2 shows an authentication method.


Rajah 2 menunjukkan satu kaedah pengesahan.
(Pahang 2013)

Figure 2/Rajah 2
State the authentication method used in
Figure 2.
Nyatakan kaedah pengesahan yang
digunakan dalam Rajah 2

.
sppangsess@gmail.com ( http://rmmict.blogspot.com )

12

5.

Example used in verifications methods is except ____________________


Contoh yang digunakan dalam Kaedah Verifikasi kecuali _______________
(KERIAN PERAK 2013)
A. Identification Card /Kad Pengenalan Diri
B. Security Token / Keselamatan token
C. Cell Phone / Telefon bimbit
D. Fingerprints Recognition / Pengesahan cap jari

SECTION C
1.

Bank KITA intends to increase the level of security in some important bank, using the
latest information technology. Through new methods such as fingerprint scanners, only
authorized officer can walk into the area. You as the head of the Information Technology
asked to manage the implementation.
Bank KITA bercadang untuk meningkatkan tahap keselamatan di beberapa bilik penting
dalam bank tersebut, dengan menggunakan kaedah teknologi maklumat terkini. Melalui
kaedah baru seperti pengimbas cap jari, hanya pegawai yang telah diberi kebenaran
sahaja boleh memasuki kawasan tersebut. Anda sebagai ketua Unit Teknologi Maklumat
diminta mengurus pelaksanaannya.
(Kelantan 2013 Set 3)
(a) (i)

(ii)

State and explain the authentication method used.


Nyatakan dan jelaskan kaedah pengesahan yang telah digunakan.
[3Marks]

List 2 examples of the same method with the above underlined statement
Senaraikan 2 contoh kaedah yang sama dengan pernyataan bergaris di atas.
[2 Marks]

(b) Explain why authentication step is very important ?


Jelaskan mengapa langkah pengesahan adalah sangat penting?

[2 Marks]

1.2.3 Controversial Contents and Control


1.2.3.1 List effects of controversial contents on society: Pornography Slander
SECTION A
1.

Statement below is about controversial issue.


Pernyataan di bawah adalah berkaitan isu kontroversi
(Bentong Pahang 2013)
Azman is a Muslim. One day, he received a spam e-mail stating that his
favourite drink Power-B uses non-halal food colouring, but he does not know if
the source of the content is credible or true. He decides to forward the e-mail to
50 of his friends.
Azman beragama Islam. Suati
hari beliau menerima email
spam menyatakan
sppangsess@gmail.com
( http://rmmict.blogspot.com
)
minuman kegemarannya Power B menggunakan bahan pewarna makanan
tidak halal, namun Azman tidak tahu sumber tersebut benar atau tidak. Azman
mengambil keputusan menyebarkan email tersebut kepada 50 orang rakannya.

13

Statement 2

Based on Statement 2 above,


Berdasarkan penyataan 2 di atas,
(i)
Azman has convicted ______________________
Azman terlibat dalam perbuatan _____________________
(ii)
State another controversial content
Nyatakan satu lagi kandungan kontroversi
___________________________________
SECTION B
1.

Figure 13 shows controversial contents on society


Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.
(Pahang 2013)

Fazli wrote an e-mail that a fellow


classmate was having an affair
with a teacher, even though it was
not true. Fazli then sent it to five
other friends.
Fazli telah menulis satu emel yang
menyatakan
seorang
rakan
sekelasnya
mengadakan
hubungan dengan seorang guru,
Fazli telah menghantar emel
tersebut kepada lima orang rakan

X
X
X Rated
Rated Video
Video
Do
Do not
not enter
enter

Based on figure 13, give an effect towards our society:


Berdasarkan rajah 13, beri satu kesan terhadap masyarakat kita:
(i)
X

(ii)
Y

sppangsess@gmail.com ( http://rmmict.blogspot.com )

14

[2 marks][2 markah]
1.2.3.2 Describe the process of filtering to control access to controversial contents
SECTION A
1.
Figure 2 shows part of an algorithm for a web page filter.
Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
(SPM 2009)

Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..
2.

Figure 2 shows the display of an internet filtering software


Rajah 2 menunjukkan paparan pada satu perisian penapisan internet

FILTERING SETTINGS

(SPM 2012)

Restricted List
http://www.seperti.com
http://www.jalan.com
START

User access

/ Rajah
ADD Figure 2 REMOV
a 2web page
Based on Figure 2 , state the
E method used

EXIT

Berdasarkan rajah 2 nyatakan kaedah yang digunakan

3.

YES

Contained

NO

banned
Figure 1 shows the keyword blocking
process
Rajah 1 menunjukkan proses penapisan
words? kata kunci
B

(SPM 2013)

C
sppangsess@gmail.com ( http://rmmict.blogspot.com )

STOP

15

Figure 1 / Rajah 1
Based on figure 1 write A,B or C to match the following statement
Berdasarkan rajah 1, tuliskan A,B atau C untuk dipadankan dengan pernyataan berikut
i.
Page download stops
Muat turun laman berhenti
ii.
Search for banned words
Mencari perkataan-perkataan yang diharamkan
4. Table 1 shows the method of an Internet filtering.
Jadual 1 menunjukkan kaedah penapisan Internet. (Kelantan 2013 Set 5)
X
uses a list of banned words to block the page
menggunakan senarai perkataan
terlaran untuk
halang laman

Y
use software to list the web sites and
block the page
menggunakan perisian untuk
senaraikan laman web dan halang
laman
Table 1/Jadual 1
Based on Table 1, state the name of : / Berdasarkan Jadual 1, nyatakan nama :
(i)
(ii)

5.

X
.........................................
Y
.........................................
State whether the following statements are True or False
Nyatakan sama ada pernyataan berikut Benar atau Palsu
(i)
Keyword blocking uses a list of banned words or objectionable terms to block the
Page completely./Sekatan kata kunci menggunakan senarai halangan perkataan
atau bantahan terma untuk menghalangnya secara lengkap....................
(ii)
Site blocking can be done by setting the browser to only accept pages with
certain level of ratings./Sekatan laman boleh dilakukan dengan menyediakan
pelayar hanya untuk menerima lamandengan aras tertentu...................

sppangsess@gmail.com ( http://rmmict.blogspot.com )

16
(Terengganu 2013)
SECTION B
1.
Figure 13 shows controversial contents on society
Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.

(Pahang 2013)

Fazli wrote an e-mail that a fellow


classmate was having an affair
with a teacher, even though it was
not true. Fazli then sent it to five
other friends.
Fazli telah menulis satu emel yang
menyatakan
seorang
rakan
sekelasnya
mengadakan
hubungan dengan seorang guru,
Fazli telah menghantar emel
tersebut kepada lima orang rakan

X
X
X Rated
Rated Video
Video
Do
Do not
not enter
enter

Based on figure 13, Z shows methods that can be used to prevent access to certain
materials on the internet. Describe one of the methods used.
Berdasarkan rajah 13, Z menunjukkan kaedah-kaedah yang digunakan untuk
menghalang capaian kepada kandungan internet yang tertentu.
Jelaskan satu kaedah yang digunakannya.
..
..
[2 marks][2markah]
SECTION C
1.

En. Aaron is a schools ICT Coordinator. He has found some students were entering the
ICT lab without permission and surfing pornography websites. Due to the incident, he
plans to use the web filtering as shown in the Figure 10.
En. Aaron merupakan Penyelaras ICT sekolah. Beliau mendapati beberapa orang pelajar
telah masuk ke makmal ICT tanpa kebenaran dan melayari beberapa laman web porno.
Lantaran itu, beliau bercadang menggunakan kaedah penapisan laman web seperti
dalam Rajah 10.
(Kedah 2013)

sppangsess@gmail.com ( http://rmmict.blogspot.com )

17

(a)

Figure 11 / Rajah 11
Based on the Figure 11; / Berdasarkan Rajah 11;
(i)

(ii)

(b)

Name the filtering method.


Namakan kaedah penapisan tersebut.

[1 mark]/[1 markah]

Explain another filtering method.


Terangkan satu kaedah penapisan lain.
[2 marks]/[2 markah]
...................................................................................................

Describe two negative effects on students.


Huraikan dua kesan negatif terhadap pelajar tesebut. [4 marks]/ [4 markah]
......................................................................................................................
......................................................................................................................
......................................................................................................................

1.2.4 Computer Crimes


1.2.4.1 Explain the need for Cyber Law.
SECTION A
1.
Cyber law is a system of moral standards or values used as a guideline for computer
users. (T/F)
Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan
sebagai pedoman bagi pengguna komputer
TRUE / FALSE
(SPM
2007)
1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement
Theft Attacks
SECTION A
1.
Which of the following statements are computer crimes?
Antara pernyataan berikut manakah adalah jenayah komputer?
(Kedah 2013)
I
Hacking / Penggodaman

sppangsess@gmail.com ( http://rmmict.blogspot.com )

18
II
III
IV
A
C
SECTION B
1.

Computer Attack / Serangan Komputer


Copyright Infringement / Pelanggaran Hak Cipta
Computer Fraud / Penipuan Komputer
I, II and III
B
II, III and IV
II and III
D
I, II, III and IV

Based on 2 statement below, answer the questions.


Berdasrkan 2 pernyataan di abwah, jawab soalan.
Julia has purchased a commercial application software and she uploads
the software to her web site for others to download it.
Julia telah membeli perisian aplikasi komersil dan dia telah memuat naik
perisian itu ke laman webnya bagi membolehkan orang lain memuat
turunnya.
Johan has downloaded an open source application software from the
Internet. He then duplicates the software and distributes to his friends.
Johan telah memuat turun perisian aplikasi sumber terbuka dari
Internet.Kemudian, dia membuat salinan perisian tersebut dan
mengedarkan kepada rakan-rakannya.
a.

b.

Who has committed in computer crime? State the type of computer crime he/she
has committed. Justify you answer. [ 2 marks ]
Siapakah yang telah melakukan kesalahan jenayah komputer? Nyatakan jenis
jenayah komputer yang telah dilakukan. Berikan alasan anda.

State two reasons why do we need Cyber Law. [ 2 marks ]


Berikan dua alasan mengapa kita memerlukan Undang-undang Siber.

SECTION C
1.

The following is a text on computer crime in television station broadcasting.


Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.
(Kelantan 2013 Set 5)

Dewi works as an editor in one of the larger private television broadcasting in Malaysia.
She uses her expertise in ICT for editing the television programs in order to preserve the
quality before they were broadcast by the television station. Without companys
permission
Dewi has made copies of the television programs and sells it via Internet.
Dewi bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen
swasta yang terbesar di Malaysia. Dewi menggunakan kepakarannya dalam bidang ICT
untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Dewi turut
membuat
salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di
Internet
Based on the text:
Berdasarkan teks itu:
(a)
State the computer crime that has been done by Dewi.

sppangsess@gmail.com ( http://rmmict.blogspot.com )

19
Nyatakan jenayah komputer yang telah dilakukan oleh Dewi.
...
[1 mark][1 markah]
(b)

Explain why cyber laws are important for television station broadcasting.
Terangkan mengapa undang-undang siber adalah penting untuk stesen
penyiaran televisyen.
..
..
..
..
[2 mark][2 markah]

(c)

Explain TWO ways from the human aspects to prevent the above crime
Terangkan DUA cara dari aspek kemanusiaan untuk mencegah jenayah di atas
..
..
..
..

[4 mark][4 markah]

1.3 Computer Security


1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
Malicious code Hacking Natural disaster Theft
SECTION A
1.
Computer security is defined as
Keselamatan komputer didefinisikan sebagai
(Pahang 2013)
security measures used to protect the network system
Langkah-langkah keselamatan yang digunakan untuk melindungi sistem
rangkaian.
B.
any criminal activity that is related to the use of computers.
Apa sahaja aktiviti jenayah yang melibatkan penggunaan komputer.
C.
protecting our computer systems and the information they contain against
unwanted access, damage, destruction or modification.
Melindungi sistem komputer dan maklumat yang dimiliki terhadap capaian yang
tidak sah kerosakan, kemusnahan atau pengubahsuaian.
D.
storing data, program and other important documents in a place that will not
affected by any major destruction.
Menyimpan data, program dan dokumen-dokumen penting di suatu tempat yang
Selamat daripada kemusnahan besar.
A.

2.

Figure 3 shows descriptions on computer threats.

sppangsess@gmail.com ( http://rmmict.blogspot.com )

20
Rajah 3 menunjukkan keterangan tentang ancaman komputer.
(Pahang 2013)
Computer program
that perform
unauthorised
processes on a
computer or a network
Program komputer
yang melaksanakan
proses-proses yang
tidak dibenarkan pada
suatu komputer atau
suatu rangkaian

Computer is used to
steal money, goods,
information or resources

Unauthorised
access to a
computer system
or network

Komputer digunakan
untuk mencuri wang,
barangan, maklumat
atau sumber.

Capaian yang tidak


dibenarkan
terhadap suatu
sistem komputer
atau rangkaian

Figure 3/Rajah 3 Q

Based on Figure 3, match the computer threats. Write P, Q or R


Berdasarkan Rajah 3, padankan ancaman komputer. Tulis P, Q atau R
(i)

Malicious Code

(ii)
Hacking
.
SECTION B
1.
Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer
(SPM 2011)

Figure 12 /
Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a)
State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
skrin komputer.

[2 markah]
State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.

[2 markah]
Read the following warning
Baca amaran berikut
(SPM 2013)
(b)

2.

Never open an email attachment unless you are expecting the


attachment and it is from
the trusted source
sppangsess@gmail.com
( http://rmmict.blogspot.com )
Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan
tersebut dan ia datang dari sumber yang dipercayai

21

Based on the warning statement


Berdasarkan pernyataan amaran itu
a.

b.

Explain why the warning important


Terangkan mengapa amaran itu penting

2 markah

i.

What precaution should you take if you cannot follow the given warning?
Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak
dapat mematuhi amaran yang diberi?
1 markah

ii.

Justify your answer


Beri justifikasi jawapan anda

1 markah

SECTION C
1.

Figure 20 shows symptoms of a computer problem


Rajah 20 menunjukkan simptom pada sebuah komputer.
(SPM 2010)
-

Screen displays unusual messages


Skrin memaparkan mesej pelik
Files become corrupted
Fail menjadi rosak
Fies mysteriously appear
Muncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
(a)
Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
i.
.
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi
ancaman itu.
ii.

i.

(b)
Describe two reasons why the computer may have been affected by the threat in
(a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

sppangsess@gmail.com ( http://rmmict.blogspot.com )

22
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human
aspects
SECTION A
1.
Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)

Plaintext

Encrypt

Decrypt

Plaintext

Name H : / Namakan H :

2.

Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak
mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus
(i)
1
Take necessary action /Ambil tindakan yang perlu
(ii) ..
Scan the selected area /Imbas kawasan yang dipilih
(iii)
3
Select area to be scanned /Pilih kawasan yang akan diimbas
(iv) ..
Table 2 /Jadual 2
(ii)

(iv)

3.
out

Ali has send a confidential file to Sandra using email. Rearrange the activities carried
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semula
aktiviti yang dijalankan oleh Ali mengikut urutan yang betul.
(SPM 2013)
P
Decrypt file
Menyahsulit file
Q
Open file received to view contents
Buka fail yang diterima untuk melihat kandungan
R
Select file to send
Pilih fail yang akan dihantar
S
Encrypt file
Enkripsi fail
T
Attach file to email
Kepilkan fail pada email

4.

TWINKLE company seeks your advice to protect their network resources from outsides
and to restrict employees access to sensitive data such as payroll or personal records.
Syarikat TWINKLE meminta nasihat anda bagi melindungi sumber rangkaian dari pihak
luar dan menyekat pekerja dari mencapai data yang penting seperti gaji dan rekod
peribadi.
What procedure you would suggest to them.
Apakah prosedur yang anda boleh cadangkan kepada mereka. (Kelantan 2013 Set 1)

sppangsess@gmail.com ( http://rmmict.blogspot.com )

23
A. Antivirus / Antivirus
C. Data backup / Sandaran data
5.

B. Anti-spyware / Anti spyware


D. Firewall / Tembok Api

Azman Company seeks your advice to protect their network resources from outsider and
to restrict employees access to sensitive data such as payroll or personal records. What
procedures you would suggest to them.
Syarikat Azman meminta nasihat anda untuk melindungi sumber rangkaian dari
pencerobohan luar dan menghalang pekerja daripada mencapai data yang sulit seperti
pembayaran gaji dan rekod individu. Apakah prosedur yang anda perlu cadangkan
kepada mereka.
(Pahang 2013)
A.
Antivirus
B.
Anti-spyware
C.
Data backup
D.
Firewall
6.
Figure 1(a) and Figure 1(b) show the
problems faced when surfing the internet.
Rajah 1(a) dan Rajah 1(b)
menunjukkan masalah yang dihadapi
semasa melayari internet.

(KERIAN PERAK 2013)


Lots of unwanted pop-up windows while surfing the
your
internet.
Banyak tetingkap yang tidak diigini keluar semasa
turun fail, komputer melayari internet.
membenarkannya.
Figure 1(a)
Rajah 1(a)

FIREWALL

When you want to download a file,


Computer does not allow it to happen.
Semasa anda ingin memuat
anda tidak
Figure 1(b)
Rajah 1(b)

ANTIVIRUS

ANTISPYWARE

Based on Figure 1(a) and Figure 1(b), match the problems above according to the
correct

sppangsess@gmail.com ( http://rmmict.blogspot.com )

24
security measures:
Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan langkah
keselamatan yang betul:
(i) Figure 1(a) .
Rajah 1(a)
(ii) Figure 1(b) .
Rajah 1(b)

7.

Table 1 shows types of security measures.


Jadual 1 menunjukkan jenis-jenis langkah keselamatan.
Antivirus
Firewall
Cryptography
Antivirus
Tembok Api
Kriptografi
P

Q
Table 1 / Jadual 1

R
(Terengganu 2013)

Based on Table 1, match the correct security measures to overcome the problem below
by writing P, Q or R.
Berdasarkan Jadual 1, padankan langkah-langkah keselamatan bagi mengatasi masalah
di bawah dengan menulis P, Q atau R.
(i)
Identify and remove any computer viruses found.
Mengenalpasti dan membuang sebarang virus komputer yang ditemui.
................
(ii)

Block unauthorized access while permitting authorized communication.


Menghalang capaian yang tidak dibenarkan manakala membenarkan komunikasi
yang dibenarkan.
.................

SECTION B

1.

Read the following situation:


Baca situasi berikut:
Wilayah 2013

As a new secretary of ICT Club, Nelly wanted to copy the club members
list from the computer in ICT room to her laptop using thumb drive.
While opening the file, suddenly she saw a pop up message as shown in
Figure 13.
Sebagai setiausaha Kelab ICT yang baru, Nelly mahu menyalin senarai
nama ahli kelab dari komputer di bilik ICT ke komputer ribanya dengan
menggunakan thumb drivenya. Semasa membuka fail tersebut, tibatiba dia melihat mesej pop-up seperti yang ditunjukkan dalam Rajah
13.
sppangsess@gmail.com ( http://rmmict.blogspot.com )

25

Figure 13
Rajah 13

(a)

(b)

(i)

What was happened to the club members list file?


Apakah yang berlaku pada fail senarai nama ahli kelab ICT?

(iii)

What should Nelly do before she open the file?


Apakah yang perlu dilakukan oleh Nelly sebelum membuka fail tersebut?

(i)

State the step should be taken by Nelly to prevent this problem?


Nyatakan langkah yang perlu diambil oleh Nelly untuk mencegah
masalah ini?

(ii)

Based on b (i), give one example of utility software that can be use.
Berdasarkan b (i), berikan satu contoh perisian utiliti yang boleh

sppangsess@gmail.com ( http://rmmict.blogspot.com )

26

SEMAKAN
Tarikh

Topik / Sub topik

Tanda tangan
Guru

Catatan

1.2 Introduction to Information Technology


1.1.2 Overview of Information and Communication
Technology (ICT)
1.1.2.1Define ICT.
1.1.1.3Describe the brief evolution of computers.
1.1.2 ICT In Everyday Life: Education, Banking,Industry
and Commerce
1.1.2.1 List the usage of ICT in everyday life.
1.1.2.2 State the differences between
computerised and non-computerised systems.
1.1.2.3 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of
Ethics,Intellectual Property, Privacy, Computer
Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property
laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification
methods/technologies.
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on
society: Pornography Slander
1.2.3.2 Describe the process of filtering to control
access to controversial contents.
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes
below: Fraud Copyright Infringement Theft
Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to
computer security: Malicious code Hacking
Natural disaster Theft
1.3 Computer Security
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures
to overcome the identified computer threats

sppangsess@gmail.com ( http://rmmict.blogspot.com )

27
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography
Firewall Data backup Human aspects

sppangsess@gmail.com ( http://rmmict.blogspot.com )

You might also like