Professional Documents
Culture Documents
Sulit 3765/1 Section A Bahagian A
Sulit 3765/1 Section A Bahagian A
Section A
Bahagian A
[36 marks]
[36 markah]
Answer all question. Write your answer in rhe spaces provide in Answer Sheet.
Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan.
A B C
Make ciopies of Copies his friends Gains unanthorised
copyrighted digital essay and submitted it access into a banks
music and distributes as his own assignment computer system and
to his friends sets up fake account
Membuat salinan esei to transfer money into
Membuat salinan rakannya dan his account
muzik digital yang menghantyarnya
dilindungi hak cipya sebagai tugasannya Mendapat capaian ke
dan mengedarkannya sendiri atas sistem komputer
kepada kawan-kawan bank tanpa kebenaran
dan mewujudkan
akaun palsu untyuk
memindahkan wang
ke dalam akaunnya
Table 1
Jaual 1
Bnased on Table 1, which two activities are gainst the cyber law?
Berdasarkan Jadual 1, manakah dua aktiviti yang bertentangan dengan undang-undang siber?
2. State whether the following statement is True or False.
Computer security refers to the steps taken to protect a computer and the information aginst
unwanted acces.
Keselamatan komputer merujuk kepada langkah-langkah yang diambil untuk melindungio komputer
dan maklumat daripada capaian yang tidak diingini.
3 Data and instruction tahat is entered into the memory of a computer is known as
Data dan arahan-arahan yang dimasukkan ke dalam memori kom,puter dikenali sebaagai
A input
Input
B output
output
C Process
Proses
D Storage
storan