Professional Documents
Culture Documents
EXAMINATION
FORM 5
2 ½ HOURS
2. Section B consists of 5 questions. Answer ALL the questions in the space provided.
3. Section C consists of 3 questions. Answer two questions. Question 1 is compulsory. You can choose to
answer Question 2 or Question 3. Answer in the space provided.
3765/1 1 SULIT
SULIT 3765/1
Diagram 1
A spam
B cookies
C spyware
D electronic profile
2. Bit is the smallest unit of data a computer can process. Byte is unit of information built from bits. One
byte is equal to _____________ bit.
3. Computer crimes include computer fraud, computer infringement, computer theft and computer attack.
State the name of crime activity for situation 1.
Raju received an e-mail inviting him to invest in a “Skim Cepat Kaya” investment. Raju took action
as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM
100,000.00 in two weeks, but after two weeks, nothing happened.
Situation 1
Computer crime for this case is _______________________________
4. Match the invention according to the right computer generations by write P, Q, or R in spaces provided
in Answer Sheet 1A .
i _______________
ii ______________
iii ______________
3765/1 2 SULIT
SULIT 3765/1
5. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A based on statement below.
Pornography can lead to criminal acts such as exploitation of women and children. _____
Based on Table 1, write A, B, or C for the following question in the spaces provided in Answer Sheet 1A.
a. Shalini wants to create and manipulate documents containing text and graphics. What type of
program should Shalini use?
3765/1 3 SULIT
SULIT 3765/1
b. “Type commands or press special keys on the keyboard to enter data and instructions that instruct
the operating system what to do. It has to be typed one line at a time.” These statements refer to…….
Learning Area 3 (Computer Network & Communication)
12. A _____________ is a high-speed network that connects networks in an area such as a city or town
and handles the bulk of communications activity across that region.
13. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.
i All computers in peer-to-peer network have equal responsibilities and capabilities to use the
resources available on the network. _____
ii Extranet is a private network that uses internet technology to share information with authorized
parties. _____
14. Ali connects three computers in his office through hub and server. The type of network that he used is
called a ____________. Ali’s customer, David who lives in Singapore connects his computer to Ali’s
new networks. This type of network is called a __________________ .
15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces provided in
Answer Sheet 1A .
Item Statement
TABLE 2
Match the correct items that represent the statement that best describe the hardwares given below.
i Modem : _________
ii Router : _________
iii Network Interface Card : _______
3765/1 4 SULIT
SULIT 3765/1
16. A movie that combines audio, graphics and animation is still considered as a __________ multimedia
content since the user is a passive receiver of the content.
A linear
B graphic
C animation
D non-linear
17.
I Implementation
II Evaluation
III Design and Develop
IV Testing
V Analysis
VI Publishing
18. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.
i Linear interactivity allows the user to interact with the content according to what the user wants.
19. Table 3 shows the multimedia development phase, based on the description given identify phases Y
and Z, write the answer in spaces provided in Answer Sheet 1A.
Phase Description
TABLE 3
Y:_______________________ Z: _______________________
3765/1 5 SULIT
SULIT 3765/1
20. Arrange the programming languages given below from the earliest generation to the latest.
A FORTRAN, Prolog, SQL
B FORTRAN, SQL, Prolog
C SQL, FORTRAN, Prolog
D Prolog, SQL, FORTRAN
21. There are two types of programming approaches, which are ____________________ programming.
I. object
II. design
III. structured
IV. object-oriented
A I and II
B I and III
C II and III
D III and IV
A. I and II
B. I and III
C. II and IV
D. III and IV
23. The following are examples of programming languages. Choose the correct pair.
24. A ______________________ is a set of words, symbols and codes that enables human to
communicate with computers.
25. A(an) _______________ translates and executes each line of code one at a time in a programming.
3765/1 6 SULIT
SULIT 3765/1
Question 1
a. Malaysian Government has passed several cyber laws to control the Internet abuse. Four cyber law
acts in Malaysia are
Digital Signature Act 1997 (i) ___________________________________
b. Lee, a bank officer, has hacked his client’s account to get information for his own use. He can be
convicted under _____________________ Act 1997. Computer crime for this case ________________
[2 scores]
Question 2
a. Based on the table 1, choose one example for suitable task given.
Task 1: Coordinates all the activities among the computer hardware devices. _________________
Task 2: Protects a computer against viruses by identifying and removing any computer virus found
in a memory or storage media or in incoming files. _______________________
[2 scores]
Question 3
1. Figure 2 shows topology of computer network.
hub
Topology A Topology B
3765/1 7 SULIT
SULIT 3765/1
School A School B
Students from School A can communicate and share data with students in school B because they are
connected to a Local Area Network (LAN).
Question 4
a. Project Manager is one of important member in multimedia developments team. State the role of
project manager.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
[2 scores]
Question 5
a. Based on the diagram below, complete the program development phases. [2 scores]
Analysis
Design
W W :________________
X :________________
X
Documentation
3765/1 8 SULIT
SULIT 3765/1
_____________________________________________________________________________
[2 scores]
This section consists of THREE questions. Answer two questions. You MUST answer QUESTION 1 and
you can choose to answer question 2 OR 3.
Question 1
Based on the following situation, answer questions.
Situation:
Your school is going to have a new intake for the Form 1 students. As a
ICT student, you are given the responsibility by your principal to
produce a multimedia project which will include all the information
about your school for the parents and the new students. Your first slide
should have your school name, school badge, and school song as
background music. Your multimedia project must be both informative
and interactive with suitable linking button to allow user choose their
a. Based on the situation given, draw a storyboard for your first slide in the box below. [4 scores]
b. What type of interactivity in multimedia suitable for your multimedia project and differentiate between
the characteristic of linear and non linear multimedia. [3 scores]
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
3765/1 9 SULIT
SULIT 3765/1
Question 2
Based on the case study and pseudo code below, answer the following questions.
Case Study
Your school needs a registration program to computerize the
registration of Curriculum Unit. Any student in the school should
have all his/her data like name, class and IC number keyed into
the Curriculum Unit registration program. After the program
verifies the student data and all fields are filled, they will notified
Pseudo Code
BEGIN
Key in students’ data
(verify data)
If all fields filled then
Print curriculum unit
Else
Print error message
End if
END
b. Based on the Pseudo code given, draw a suitable flow chart to show the flow of program.
[4 scores]
3765/1 10 SULIT
SULIT 3765/1
Question 3
Network B
Network A
Server
Modem
Intern
et
Figure 1
a) Name the topology of Network A. Give two advantages for topology in Network A.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
________________________________________________________
[3 scores]
b) State two computer security threats that will be faced by CMA Company through its
computer network and explain one of the security measures that can be applied to avoid
the security threats.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
______________________________________________________
[4 scores]
3765/1 11 SULIT
SULIT 3765/1
Name : ………………………………… Class : …………
…………..
ANSWER SHEET A1
3765/1 12 SULIT
SULIT 3765/1
SCHEME
SECTION A
NO. ANSWER SCORE
1 C
2 8
3 COMPUTER FRAUD
4 (i) R
(ii) P
(iii) Q
5 TRUE
6 C
7 A
8 (i) OUTPUT
(ii) INPUT
9 (i) FALSE
(ii) TRUE
10 (i) EXPANSION SLOT
(ii) PROCESSOR SLOT
11 (i) C
(ii) B
12 B
13 (i) TRUE
(ii) TRUE
14 (i) LAN / LOCAL AREA NETWORK
(ii) WAN / WIDE AREA NETWORK
15 (i) P
(ii) S
(iii) R
16 A
17 C
18 FALSE
19 (i) DESIGN AND DEVELOP
(ii) TESTING
20 B
21 D
22 D
23 B
24 PROGRAMMING LANGUAGE
25 COMPILER
3765/1 13 SULIT
SULIT 3765/1
SECTION B
3. Bla…bla…bla…bla
SECTION C
Question 1
a. )
Question 2
a)
Question 3
a.)
3765/1 14 SULIT